Vulnhub - WestWild writeup
WestWild:1.1
Author: Hashim Alsharef
Nmap

Okay so other then HTTP and SSH we have SMB. So let’s just start with that.
SMB

So I logged into the wave share and found 2 files there.

I downloaded both the files by using the get command.
The FLAG1.txt had the first flag and credentials for the user wavex

wavex:door+open
And the message file had a message ;-)

Privilege escalation
With the credentials we found in FLAG1.txt we can login via SSH.

Since I was in the system I ran the enumerations script but found nothing interesting. I tried to check the sudo right with sudo -l but wavex didn’t had any.
Then I decided to check all the directories that are editable by wavex
find / -writeable -type d 2>/dev/null

There was this interesting dir usr/share/av/westsidesecret/. In there I found a file which had credentials for aveng.

aveng:kaizen+80
I su to aveng using the credentials.

Then I checked it’s sudo rights and this user was allowed to run all the command.

So I did sudo su to become root.

Now get the damn flag.

It’s definitely a good box for beginners, especially getting the root part should be fun.
Thanks to @hashimalshareff for this cute little box :-)
Thanks for reading, Feedback is always appreciated.
Follow me @0xmzfr for more “Writeups”.