DC-1 Penetration Testing Lab Overview.
Objective:
Gain experience in penetration testing through a purposely built vulnerable lab.
Target Audience:
Beginners with basic Linux skills and familiarity with the command line and penetration testing tools (e.g., Kali Linux, Parrot Security OS).
Challenge Details:
- Total Flags: 5 (clues provided for beginners).
- Ultimate Goal: Access and read the flag in the root’s home directory.
- Privilege Requirement: Root privileges needed for final flag, but not to access other flags.
Approach:
- Explore multiple pathways to gain root access.
- Beginners may face unfamiliar challenges; online resources can assist in overcoming these.
Key Skills Required:
- Basic Linux command line proficiency
- Familiarity with penetration testing methodologies and tools
Active Host discovery:

netdiscover -i eth0 command is used to scan the local network for active hosts on the specified interface (eth0).Scanning:

nmap -Pn -A 192.168.1.109 performs an in-depth scan of the IP address 192.168.1.109. It bypasses host discovery with the -Pn option, assuming the host is online, and uses the -A flag to enable advanced features like operating system detection and version identification of services.




lscommand to list the files and identify flag1.txt. Subsequently, we employ thecatcommand to retrieve the contents of this file, thereby obtaining our first flag.
sites directory and list the files and subdirectories. Within this listing, we identify settings.php. We then use the cat command to display its contents, which reveals our flag2.
drupaldb.
drupaldb database and proceed to view its tables. Subsequently, we select theusers table and execute a query to retrieve all records using drupaldbSELECT * FROM users;.


find. -exec /bin/sh \;-quit, which spawns a shell with elevated privileges, enabling us to open the root directory.And it's done, the 5th flag was the Final Flag.
No comments:
Post a Comment