BBS (CUTE) Vulnhub Write-Up

Sarthak joshi
3 min readNov 19, 2020

--

Hey there ! Today We have another boot2root challenge “BSS(CUTE)” which is created by “foxlox”, Its an intermediate level box and here is the link below where you can download this VM:- https://www.vulnhub.com/entry/bbs-cute-102,567/

1.) Target Discovery

# netdiscover -i wlan0

Here we got the target IP which is “192.168.1.9"

2.) Port Scanning and Service Detection

For this job I used “NMAP”

# nmap -sT -p- -vv 192.168.1.9

We got so many ports on this VM. Lets go for HTTP.

3.) HTTP Enumeration

“# gobuster dir — url http://192.168.1.9/ -x html,php,txt,js -w /wordlist.txt”

With the help of “gobuster” I got “index.php” file on the web server.

So here is a web application running on the web server, but if we look at the bottom of the register button we got the version of the application which is “2.1.2”, so the application is “CuteNews 2.1.2”.

And we have a exploit for this web application too, So I used exploit “48800” form “searchsploit”

This exploit needs some minor changes like url paths for the target web application.

Now all changes are done and its time for exploiting the target web application

4.) Capturing Reverse Shell

And we got the shell, but with this shell we cannot explore the hole VM , for that we need a proper python shell ,so I switched to python shell.

5.) Privilege Escalation

“$ find / -perm -u=s -type f 2>/dev/null”

from the above command we got some binaries with super user permission and one of them is “hping3"

So it’s time to exploit it

“$ hping3”

“hping3” provided us the root privilege. From here we can run any command as root, as you can see in the above image we are able to read “root.txt” flag in the root directory

Challenge Completed !! :D

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Sarthak joshi
Sarthak joshi

Written by Sarthak joshi

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart

No responses yet

Write a response