❯ nmap -sS -sV -p- -A $ip Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-14 15:35 CST Nmap scan report for 192.168.56.114 Host is up (0.00074s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0) | ssh-hostkey: | 256 e7:ce:f2:f6:5d:a7:47:5a:16:2f:90:07:07:33:4e:a9 (ECDSA) |_ 256 09:db:b7:e8:ee:d4:52:b8:49:c3:cc:29:a5:6e:07:35 (ED25519) 80/tcp open http Apache httpd 2.4.61 ((Debian)) |_http-title: Paris 2024 Olympic Games |_http-server-header: Apache/2.4.61 (Debian) No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: ........................... Network Distance: 2 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 111/tcp) HOP RTT ADDRESS 1 0.47 ms 172.20.32.1 2 1.06 ms 192.168.56.114
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 38.43 seconds
❯ ssh vanity@$ip The authenticity of host '192.168.56.114 (192.168.56.114)' can't be established. ED25519 key fingerprint is SHA256:La9YyHs4GERVO8XTRRw0cLh6XcInXX35Ar9OiMsXwQk. This key is not known by any other names. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '192.168.56.114' (ED25519) to the list of known hosts. [email protected]'s password: Linux jo2024.hmv 6.1.0-23-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.99-1 (2024-07-15) x86_64
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. vanity@jo2024:~$ cat user.txt e2cb9d6e0899cde91130ca4b37139021 vanity@jo2024:~$ sudo -l Matching Defaults entries for vanity on jo2024: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin, use_pty
User vanity may run the following commands on jo2024: (ALL : ALL) NOPASSWD: /usr/local/bin/php-server.sh vanity@jo2024:~$ cat /usr/local/bin/php-server.sh #!/bin/bash
vanity@jo2024:~$ su Password: root@jo2024:/home/vanity# id uid=0(root) gid=0(root) groups=0(root) root@jo2024:/home/vanity# cd /root root@jo2024:~# ls root.txt root@jo2024:~# cat root.txt cbd60dab37bc85e1f7ea4b5c9c4eed90