ColddBox: Easy Vulnhub Write-up

Sarthak joshi
3 min readNov 2, 2020

Hey there! today we will try a beginner level boot2root challenge called colddbox created by ‘c0ldd’. You can download this machine form the link:- https://www.vulnhub.com/entry/colddbox-easy,586/.

1.) Target Discovery

# netdiscover -i wlan0

By this command i got the target’s ip address which is 192.168.1.9

2.) Port Scanning and Service Detection

# nmap -sT -sV -p- 192.168.1.9

With the help of nmap I found two service running on this VM, first HTTP on port 80 and second SSH on port 4512.

3.) Web Enumeration

After doing some manual enumeration I found that there is a wordpress installation, So whenever we found wordpress our first approach is to use wp-scan.

# wpscan — url http://192.168.1.9/ — enumerate u

we got the users c0ldd, hugo, philip and as I got these users I tries to brute-force the password with Wp-scan.

# wpscan — url http://192.168.1.9/ — usernames c0ldd — passwords /opt/wordlist/rockyou.txt — password-attack wp-login

We got the valid credentials for user c0ldd : 9876543210.

login successful . After that I tried to install a plugin called “wp file manager”

It’s a plugin which let you download and upload a file on the remote server, But putting a reverse shell will not provide us the shell of user ‘c0ldd’ so I tried to install the plugin and then download the ‘wp-config.php’ file to get the ssh connection of the user ‘c0ldd’.

After downloading the ‘wp-config.php’ file I got the correct password for the user ‘c0ldd’ which is ‘cybersecurity’

4.) SSH Connection

# ssh c0ldd@192.168.1.9 -p 4512

Yehhh..! Got the ssh connection and user.txt user flag. Time for privilege escalation

5.) Privilege Escalation

# sudo -l

The above command tell us that we can run some set of commands with sudo rights like vim, ftp and chmod.

So I used ftp command for root privilege

# sudo ftp

ftp>!/bin/bash

Got the root privilege and the root.txt final flag. Finally boot2root challenge completed.

--

--

Sarthak joshi

Penetration Tester, CTF player, Full time Learner and Part Time Blogger. Twitter :- https://twitter.com/Exploiter_21, Linked :- https://www.linkedin.com/in/sart