Agent Sudo

January 05, 2024

Task 1 Author note

Task 2 Enumerate

3

user-agent

chris

Task 3 Hash cracking and brute-force

crystal

alien

area51

james

hackerrules!

Task 4 Capture the user flag

b03d975e8c92a7c04146cfa7a5a313c7

Roswell alien autopsy

Task 5 Privilege escalation

CVE-2019-14287

b53a02f55b57d4439e3341834d70c062

deskel

-A is for spoofing the user agent and -L follow any redirects.

"C" as we know there are 26 letters in alphabets but letter C is we get the right response.

Then we can use hydra to find the password of username chris

After we got the password we can now proceed to ftp

Then we can use binwalk to extract some files in the png

After that we can use zip2john for the zipfile that is located in the _cutie folder

Then just john to crack the hash

After that we can extract password from the cute-alien.jpg

After we use that we can now see the message from that jpg

which is "hackerrules!"

I tried to get the jpg from james directory with python server and wget

I just got the answer when im using OSINT

With just simple command we can priv esc to root.

Last updated