TR0LL: 1 Walkthrough
Tr0ll was inspired by the constant trolling of the machines within the OSCP labs. The goal is simple, gain root and get Proof.txt from the…
Tr0ll was inspired by the constant trolling of the machines within the OSCP labs. The goal is simple, gain root and get Proof.txt from the /root directory. Not for the easily frustrated! Fair warning, there be trolls ahead!
Difficulty: Beginner ; Type: boot2root
Enumeration
More Enumeration…
- FTP
Well, well, well, aren’t you just a clever little devil, you almost found the sup3rs3cr3tdirlol :-P
Sucks, you were so close… gotta TRY HARDER!
2. HTTP
- Manual Testing
- Nikto Scan
- GoBuster
let’s see the directory sup3rs3cr3tdirlol,
Let’s go 0x0856BF🤓,
Usernames:
maleus
ps-aux
felux
Eagle11
genphlux < — Definitely not this one
usmc8892
blawrg
wytshadow
vis1t0r
overflow
Passwords:
Good_job_:)
Finding the Point Of Intrusion (POI)
Wait, it is a troll😵
password might be:
Privilege Escalation
Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) — ‘overlayfs’ Privilege Escalation 59
You can use this to escalate the privilege.