mzfr@home:~$

Vulnhub - WestWild writeup


WestWild:1.1

Author: Hashim Alsharef

Nmap

Okay so other then HTTP and SSH we have SMB. So let’s just start with that.


SMB

So I logged into the wave share and found 2 files there.

I downloaded both the files by using the get command.

The FLAG1.txt had the first flag and credentials for the user wavex

wavex:door+open

And the message file had a message ;-)


Privilege escalation

With the credentials we found in FLAG1.txt we can login via SSH.

Since I was in the system I ran the enumerations script but found nothing interesting. I tried to check the sudo right with sudo -l but wavex didn’t had any.

Then I decided to check all the directories that are editable by wavex

  • find / -writeable -type d 2>/dev/null

There was this interesting dir usr/share/av/westsidesecret/. In there I found a file which had credentials for aveng.

aveng:kaizen+80

I su to aveng using the credentials.

Then I checked it’s sudo rights and this user was allowed to run all the command.

So I did sudo su to become root.

Now get the damn flag.


It’s definitely a good box for beginners, especially getting the root part should be fun.

Thanks to @hashimalshareff for this cute little box :-)


Thanks for reading, Feedback is always appreciated.

Follow me @0xmzfr for more “Writeups”.