It has been a long time since the first part of this host from Vulnhub. I apologize, I have simply forgot it. With this post, I want to finish the walkthrough of this host. The first part ended with the password of Luigi. The next obvious step is to connect to the host over ssh
using the found password.
Tag: boot2root
Hi fellows,
In this post I want to show you another walkthrough of a Vulnhub machine. This time it is the Super Mario Host which can be found here. As always, if you haven’t solved this challenge yet, I hardly suggest that you first try it by yourself and consult this post as a reference.
Hi fellows,
I finally managed to solve the last part of this CTF challenge. If you have not read the first two parts, you can find them here (Part1, Part2). So let me now continue with the last part. As always, ***SPOILER ALERT***
We left the second part with root privileges on the puppet machine and the first flag in folder /root/protovision/
.
Hi fellows,
Welcome to the second part of the Vulnhub Analoguepond 1 walkthrough. If you have missed the first part, you can find it here.
I have finished the last part with finding the troll flag and escalating the privileges on the first machine. So let’s continue finding the other flags… I had some time to find out how to proceed. I examined a lot, especially at the places where we need root privileges, but I found nothing. After a bit, I looked at the network interfaces and found something interesting
Hi
In this post I want to start with a walkthrough of the Vulnhub challenge Analoguepond 1. Since I have not finished this box yet, I will split this walkthrough into several parts. This here is the first part. So lets start.
The first thing I usually do when I start such a challenge is to scan the network in order to find out on which IP address I can find the box. In order to do so I usually use netdiscover
.