{"id":1,"date":"2023-04-17T01:16:42","date_gmt":"2023-04-17T00:16:42","guid":{"rendered":"http:\/\/chrisintech.com\/?p=1"},"modified":"2023-05-01T05:33:32","modified_gmt":"2023-05-01T04:33:32","slug":"sql-injection-lab","status":"publish","type":"post","link":"https:\/\/chrisintech.com\/index.php\/2023\/04\/17\/sql-injection-lab\/","title":{"rendered":"SQL Injection Lab \/\/ Exploiting Vulnerable Web Server with Kali Linux"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>After playing around in TryHackMe rooms for a few months, and inhaling content from John Hammond, Network Chuck, &amp; David Bombal, I decided I wanted to try something a little more involved by setting up my own hacking lab to try and attack a vulnerable machine from Vulnhub.<\/p>\n\n\n\n<p>Did a quick google search and found a really well-written blog <a href=\"https:\/\/medium.com\/@gavinloughridge\/a-beginners-guide-to-vulnhub-part-1-52b06466635d\" target=\"_blank\" rel=\"noreferrer noopener\">post<\/a> by <a href=\"https:\/\/medium.com\/@gavinloughridge\" target=\"_blank\" rel=\"noreferrer noopener\">Gavin Loughridge<\/a> that walked through exploiting the NullByte box from Vulnhub with SQL Injection. I figured this would be a good place to start and downloaded the ova file.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Setting Up<\/h2>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"468\" height=\"167\" src=\"https:\/\/lh6.googleusercontent.com\/m62WbZtOiHiyStKhPnGet9X8FP2i2E3Y05BK6JW7LFOxJ7W1KavMXKbK2cFJhw7TpHNxuDnQN-qlqppOU3iTaEmsiihFdF4k9wUAKFP6tDg9HE7jcDiv6mfGbIM_UjP8aXI_mLnqV8HgiW3P2wTDag\"><\/p>\n\n\n\n<p>The first daunting task I had to tackle was actually setting up the lab; getting both VMs into Virtual Box, putting them both on an internal network, and set up DHCP on the internal network to auto assign them IPs.<\/p>\n\n\n\n<p>Loading both VMs into Virtual box was straight-forward, and going into each of them and putting them on an internal network was also simple. My first snag came with setting up DHCP, and if I&#8217;m completely honest it was probably the hardest part of this entire process.<\/p>\n\n\n\n<p>I&#8217;ve used Virtual Box for quite a while, but I&#8217;ve never had to use VBoxManage to configure anything. I found the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.oracle.com\/technical-resources\/articles\/it-infrastructure\/admin-manage-vbox-cli.html\" target=\"_blank\">documentation<\/a> really helpful as well as this <a rel=\"noreferrer noopener\" href=\"https:\/\/www.hackercoolmagazine.com\/how-to-enable-dhcp-server-in-virtualbox\/\" target=\"_blank\">article<\/a> on how to enable DHCP in Virtual Box.<\/p>\n\n\n\n<p>After some trial and error, I did eventually get everything set up correctly and can finally move on with the project. I started with a ping check to make sure my attack machine (Kali) can reach the vulnerable machine (NullByte).<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"468\" height=\"228\" src=\"https:\/\/lh6.googleusercontent.com\/7ulNfRryby9pHDKrEha-8mQt-j3QPqTqYGw8yC5DXIhm_wdIDxlNriY-OaGQcX0NgIY0mGRpcOaqKNCDABT0iwgN8ONJCS9diL_NJukG7yMQEQalDu8kFGxAkhv27fl6lzG3uSMXGBk7oeSkvuFHHw\"><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Port Scanning<\/h2>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"468\" height=\"299\" src=\"https:\/\/lh3.googleusercontent.com\/mhPPlP8HYLQhZfHIz9vrZCgAA1H2J3iaFbLUSWObaaA0nEueQ7MpAZz2VkmVq5D7Ixw2wZ1rPt2H2ZaT3NJI9ywpVcmxn52lgUZlzRNA-iBmZ7mJvdServaectY1D-47coyGV2Keoe4I_E4ptReG1A\"><\/p>\n\n\n\n<p>Started an nmap scan to check for open ports on the machine and output to a file so I could refer back to it later if needed. The scan shows ports 80, 111, &amp; 777 open.<\/p>\n\n\n\n<p>Since it is a tutorial about SQL Injection, port 80 is probably the one to investigate first, so I opened up a browser to check it out.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"321\" src=\"https:\/\/lh3.googleusercontent.com\/Q_JDOgSCaex17_CaGu-IEuRSvJhT3VOP4_AhV4RMmOL5w07EirHDlObFq_sfa7_BcpqQZaT-6sI8hmIFw9v0itgSEaEGCSxN4rv5PnBRkJ0Fdra0Y8OQmz402Ss1EfHQhzVgaDWMHSrBFocr7Sf4XA\"><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Hidden Paths<\/h2>\n\n\n\n<p>I&#8217;ll admit that I would be pretty lost at this point if it wasn&#8217;t for the tutorial and some extra googling. If you download the image on this page and run the strings command on it you are rewarded with a random string of characters that represents a hidden directory path on the website: &#8216;\/kzMb5nVYJw&#8217;<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"342\" height=\"130\" src=\"https:\/\/lh4.googleusercontent.com\/Cwi4gCnxPiQEHzOGGA5hnphYSkQBeIQ8dv8iChT-3oFKFr_maebnMr0MSXMBZME6sngKc577PHxZ8YXnNUc_uPgJoOsuFKRCs3XWl497VLRlI-7GwiXNpkc5c9XnIuXkMqlh7ie3nKax1sipALtmEQ\"><\/p>\n\n\n\n<p>The new page presents you with a prompt for a Key, and an incorrect entry will result in the text &#8216;invalid key&#8217; displaying on the page.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"267\" height=\"99\" src=\"https:\/\/lh5.googleusercontent.com\/6xMdM6EP0KDbkbGxBYUyDn_tgGV8ZC2P6J_YWoX-hjLUakeb1hJ6M7zicXImKSt8a2bRCHuV1e6Ri_CJmeIBm1gl_50gvRYwIFaI1Rgux3TxvQLIUqCwrCbmNiDS1vOQFVuwC-OrYN4NVP7Etspo4Q\"><\/p>\n\n\n\n<p>If you open the developer&#8217;s console on this page you get a hint in the inspector:<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"315\" src=\"https:\/\/lh5.googleusercontent.com\/jQsDGFo29tYtpFgZQ7bl-g2_oOVYM0aBAfzc5v0hIKzDRTrmZXrStRvjhqMq_0SPCetDoDy58j-Gay6LodVed9zCpH5CUk055YW2yqZhySVVPAS4L0sJdIOdnbC74N6UWozlwC16rvb3y_JyDW_sPA\"><\/p>\n\n\n\n<p>Now I know that this input isn&#8217;t connected to the database and that the password isn&#8217;t complex. So I can try to brute force the password with Hydra. I just need a couple of things first.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Password Cracking<\/h2>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"140\" src=\"https:\/\/lh5.googleusercontent.com\/n972KG0ySPGMD0MYghFpQE6_Q75MKk62G4G-_yWNgZ7sqZo9ytf2Bs4bNN74BpaUyZCYN-4K88TfJGZZfn4upW2gpBdBK1CryCoNaqCBT1KEI8PJ-NrtrPE_Eo4wuOCMEbZxIQtHBbB9jJoN6IZI8w\"><\/p>\n\n\n\n<p>I switched over the the network tab to see the Request and Response from the server when a password is submitted.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"139\" src=\"https:\/\/lh3.googleusercontent.com\/28dpK7WMzox5pCJdZI0v-dK_Mo-HtM80AD7LorezP6FyNlYXGnJXGzLyUFeIB6rHJoYpNjOztB7HfgdaL31vGOAJG6-bAYAOIlrco5PLk6pZ70zYB0t6rpJFySMW4zyOq6QpJYTPKS9oobvBqFK8IQ\"><\/p>\n\n\n\n<p>The Request tab shows that the only data sent in the form is the variable KEY.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"221\" src=\"https:\/\/lh5.googleusercontent.com\/oT4GJklmYfxilYJytzQHosKYBzeSbwRg8ETEruvBBppLU3ycqwBBKC7PlIehy0xU7AqdSjkEogCmZyU6nGB-BuHpnagYrKJ65MG89Ud-aqBvZe6-Kqji2ROE4MBQDvtl82DRdU3d6qGin1SqX3hd4g\"><\/p>\n\n\n\n<p>The Response tab shows that the page will display &#8216;invalid key&#8217; when an incorrect KEY is submitted.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>With all of that info we can now run hydra with the rockyou.txt password list to try and brute force our way past this page.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"48\" src=\"https:\/\/lh4.googleusercontent.com\/mMJgzeCCl4isLbyVwlbVhJk72ujEHQqQBwg4dGz19VdZgWwCb97G1ZO2DH3_0p8TUbx1GmfjxX5T--T9_CRg4VcZU7YTRiXswPQfqNM1uh3vqdqAiyjTruS17Zbgr21-lP1FMqQOXNhE78cYqLxD6w\"><\/p>\n\n\n\n<p>This line says there are no usernames and to use the rockyou.txt wordlist for possible passwords, I supply the IP, the form type, the directory path with the variable &#8216;key&#8217; and the text &#8216;invalid key&#8217; to denote an incorrect password and let hydra do its thing.<\/p>\n\n\n\n<p>The password is found very quickly; &#8216;elite&#8217;<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"83\" src=\"https:\/\/lh5.googleusercontent.com\/OtR5T4xaPLAtihGGgMuXjY96yswJf8g8BUioIgzEIdx3zrXj7NRelrMoHKgEneNKZY1jNtCoiiBBeeZiy4PDmSMLtKikSqEcAUoYMhKzQHzIY1FuQk29IDoX6T0KIJuXKkyvZtGPNM1MPZxbMLfblA\"><\/p>\n\n\n\n<p>When I type the found password into the website I&#8217;m greeted with a new page:<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"564\" src=\"https:\/\/lh6.googleusercontent.com\/g3A_b-yumnEtpPhY7xqkgWrmO9uGDK6Qb6blo2tSW3ZFvjf8H0JM4QulvQ3zApWbd59-PteRO1Jp5mLei-HQybtAmnoweO0jvjI8COROx3uhRGuw0Ddt1CQy8UxqU5FAKLT6Bcj0plg7IcpSftlXcg\"><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">SQLMap<\/h2>\n\n\n\n<p>With just some manual poking and prodding I noticed that just pressing Enter on the site brings up two entries:<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"279\" src=\"https:\/\/lh5.googleusercontent.com\/xbwwfbfjXS35XaZ0N1qf2edUWAJI8CNv-c8SX7l052igK4lbIGQMlFdGZ8F6Ey4exU90uRMgmFEPrRvp4JmBBpNO4Z-6b78LD1GDojxmdQkyo8Dc41N_hZO1pqnGcOTcFBuo-MjMoFlaKHQ54Ys2Ig\"><\/p>\n\n\n\n<p>Next I needed to try some basic SQL Injection to see if the server may be vulnerable. I started with the &#8216; character, but it handled it just fine.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"448\" src=\"https:\/\/lh5.googleusercontent.com\/M8dIgRGiCLY8SVB9vBWzXsTGOs5CLx8vbaJXelgR4KnOq082_qF5qoZUtWuWcur1xdsuCD2nnu7UYHUKsApeCwjqvQCaFsRBU3IE1W2mIoZ0vp6EK3M-KGshaiq769IQIEU6R20jLMtYvqiRyttx0Q\"><\/p>\n\n\n\n<p>Next I tried &#8221; and this caused it to throw an error in response.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"164\" src=\"https:\/\/lh5.googleusercontent.com\/6f31Ly6LYwIKc3s6CfPcEPmzpcdCRAgeNN471ZHFhtpIV2YyHQ6hdTXfnO8SPKoAK5W4qqHrbgLjSi8oVkbw93TYOeUHrc2bbSs0pMMZ2X-sC5ugq_SCdR6LVrm9d3vhAabzh76HB-UzBHN7yUoaUQ\"><\/p>\n\n\n\n<p>Knowing it could be vulnerable, it&#8217;s time to rely on sqlmap with the url used after a search is made.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"598\" height=\"72\" src=\"https:\/\/lh4.googleusercontent.com\/_ThMzXS7u-bLBK06-2dbzI8DwjpDXmXE13g7OrL7HmwaPCz6wzORkts9FOC8vkg_IWW1oEl3CIgkvQDg1l3VeBZNWr0IOChPBeyztWJq2l8P7XRJVHW2F_-N91GjOYz-lnAL8u75pcf4vJvEBMkHqg\"><\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"205\" src=\"https:\/\/lh3.googleusercontent.com\/kxq-XHo68hBFSMlb-YaILCfMrOI3nVRnCBHXAfcpwlPNWAQ2qZFFy-EbRuMaPqWVo7TR9wpzWoKynfhSkC_JG6Ay7eDXLfMM1RB2BbT_l-_J82sl_c1hse8XIZAhZRkNIqTLkcqxyirWQpLB-JaSzg\"><\/p>\n\n\n\n<p>sqlmap confirms that the &#8216;usrtosearch&#8217; variable is vulnerable to SQL Injection.<\/p>\n\n\n\n<p>Now I can poke around and see what databases I have access to with the -dbs flag.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"827\" src=\"https:\/\/lh4.googleusercontent.com\/LJpsDUzpN-sxVYe8BUBrDEn93g_3T-vKYC4_XTOjZ8_q6PKXfcvgpXQt-DOyKWp8q90uTxLLF-TxSN-B8Gt9srjzZRnIgo5GOGWtwSRMPhlf7VxSsihVDzA1P5G6j1Mu14507URuMC1IOdtwKsmNWA\"><\/p>\n\n\n\n<p>The most interesting database seems like it&#8217;s going to be &#8216;seth&#8217; so I checked which tables were in the seth database.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"764\" src=\"https:\/\/lh5.googleusercontent.com\/bAZphPoAAsF1GX5okwjxBHWB0_UigzJRBs8R_lQaIGXdaomkwUGmjpnljSDyiO6hBH1ETawr9czzJOJMkDeF9R9uNMtmBNPFrJ-KAIPzNyd7PpvCRwTeY98DHpxTi7ur-5OZsmd4CyuQkAHiU1OMxA\"><\/p>\n\n\n\n<p>There&#8217;s only one table named &#8216;users&#8217; so I can see what columns are in this table.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"755\" src=\"https:\/\/lh3.googleusercontent.com\/moMrvXKuhCgMYAUyzSgvRikMAppNlL5XxKXvLeb9shQ5aP3djF_ZPFzwhFKR9mxNQbeWWti0FMVeVVSXIkFuBYRASDZhZ9CaueJNF0j8wxMyzXZwgvS2KAcog1w77k_FQ0wha9WSUnsVoU8vipEBcg\"><\/p>\n\n\n\n<p>The user and pass columns are what I want so I dump those out.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"672\" src=\"https:\/\/lh5.googleusercontent.com\/zDFct23yhhYyudhzkFmgKrygznu9BPYYFzKxVwUJBQ2GPwYJdOCkX_KC5SgqNFWOS-UDat79lrkJwpgrEvn03eX0rOU3M7w2Qo4U1136yP4mKgdKK4Yq_1VRLwAzq1X_TZuaVeQQBr46b95unqR-qQ\"><\/p>\n\n\n\n<p>Now I have a username &#8216;ramses&#8217; and a password that&#8217;s a hash.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cracking Hashes<\/h2>\n\n\n\n<p>Not really sure what to do with hashes and the article I was following didn&#8217;t explain it to me in depth enough so I wanted to see what the process for cracking a hash once I discovered one. For this I turned to Google.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"931\" src=\"https:\/\/lh4.googleusercontent.com\/AKpcnTumDNvV3EVJLn3j-9IomBAMQehFzbvR9sG_MuacvTKIHDujYBLQAGwYub7K_iI38AcKtzgW6R8v7n2JgB_OKw5YcZyHyUCQrJWqBMXefgzSlQb7XATO1P9Y9NAYExNu_63F4PI1Jeb1K5isaA\"><\/p>\n\n\n\n<p>After reading through some very&#8230; difficult-to-read websites I finally was able to transform the 64 bit hash version to MD5 and then to the plain-text password; &#8216;omega&#8217;<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"71\" src=\"https:\/\/lh3.googleusercontent.com\/0PRb4Y5lLMmBdAmqfTWaSZm_uTkhinaKDhLn53SIlZv8G3TBd3S60KplYADZSPHd8uedptTdJNCxfDWZGYOXau1-ZVhkorrA3_RfbeYsb2m7mPoec9srrLybPDPohp7dQ7jIRu149jPbfqhTpYJilA\"><\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"508\" height=\"265\" src=\"https:\/\/lh3.googleusercontent.com\/KzyvYqLNxwouKoZGQMVsRt7Av8WiHFjTm1KfGbdg5AIhib4hF7kvJlypy2X_1d85m3LGN6VuJTPUqYCfDFYD0tsIfr7AiL-PzHYYnUwtyPXMlwNK855vNud9DUzIXRdrspS3D0BHKQTXWtYEi4KUWQ\"><\/p>\n\n\n\n<p>With the initial nmap scan I do remember that there was ssh on port 777 so I opened up a terminal connected to the target machine over ssh with the username &#8216;ramses&#8217; and password &#8216;omega&#8217;<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"155\" height=\"65\" src=\"https:\/\/lh4.googleusercontent.com\/RRmOcU6Nu84YI7TOAgIq90z8pG__5RPwBI60iSRoj7Nxe7sGx53aWC9CDubQbi6hCI5h4Zli5LwFd6TU3mK18vXXmHfEbWNoHifVB6Z6D0rvz3VdRHj8aMJtl5Zm0NIMNjIy1OxFW16_kTu67G0zAQ\"><\/p>\n\n\n\n<p>&#8230; I&#8217;m in \ud83e\uddd1\u200d\ud83d\udcbb<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Privilege Escalation<\/h2>\n\n\n\n<p>I don&#8217;t have a ton of experience or practice with privilege escalation so I just went with the article on this one to go through the motions and research the why&#8217;s as I go.<\/p>\n\n\n\n<p>To start, I printed out the history of the user ramses with the cat command.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"592\" height=\"638\" src=\"https:\/\/lh3.googleusercontent.com\/iowCIo0a1BQd-2G3fzXIpPzRsIPwdRJd4HE1VEJsFfNrZz_nvbhec2z94GNpv0jVHIBxohgyD5fnDzmCxUW68sDWpqA9s6UQ8-u1v9Pi3kWhfCDoCGk-dt8Vv9Yl4oFq-H7tPIYzLJu6zQEg0gGGmw\"><\/p>\n\n\n\n<p>After messing around and trying some of the same commands ramses did, you find out that ramses is not a part of the sudoers group and can not access certain files and directories, like \/root, and you also come across the &#8216;procwatch&#8217; file which, when run, runs the ps command to show processes.<\/p>\n\n\n\n<p>If I can link a different command to ps and re-run the procwatch file I may be able to perform commands that I normally wouldn&#8217;t have the proper permissions for.<\/p>\n\n\n\n<p>I start with trying to link the ls command to the ps command.<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"507\" height=\"40\" src=\"https:\/\/lh5.googleusercontent.com\/_rIxG3NWhyTQNn1AHkJWZT2rhVLrKzzxhXndB42RAFYqslc067-jCGallDb3A_TmIEMm1EPPtL5kFhKk_0EB_ZRi85FpPj9othAHxkrchTmHGkq2GLPmIPivApShVtxMfwKlPqx8LVFWwgCzwdXxVA\"><\/p>\n\n\n\n<p>I ran procwatch and&#8230;<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"366\" height=\"64\" src=\"https:\/\/lh3.googleusercontent.com\/hi6xZzU2FkKYCMtKXyIVWpazrmmapM7fNvpzdbR2rr0_NGUEwA9pWAhLa32sJNgwJb-m1nB0b3XwQOVs0LUU3YUgj_IyORjinZlHRUQ7RWZ28xNbj9udAXCQSrzKgDWfjtZ4OlMB2FTLN1YpbNUMVA\"><\/p>\n\n\n\n<p>&#8230; I get a list of the current directory. Success.<\/p>\n\n\n\n<p>I change the link from ls to sh to launch a shell (which when launched is given the permissions of the file that launches it) <\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"419\" height=\"238\" src=\"https:\/\/lh3.googleusercontent.com\/fqHP-6WXFCiLL59rTNyuEfOWyQqmOenipD_o8nQxnRxGTWJyXDER04uK43sLlVg4MSPLIDAssbdNCV8sWlkjtDG7mCfqx-w4Z6kVE2A_sQqZ94gi51mHHUC6DiBITNbue78L1vyWLHHfgbhSu7idBQ\"><\/p>\n\n\n\n<p>and the procwatch file just happens to have root permissions.<\/p>\n\n\n\n<p>Now I can navigate to the \/root folder that I wasn&#8217;t able to access before and can cat out the proof.txt file located there as the final flag. \ud83d\udea9<\/p>\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"408\" src=\"https:\/\/lh5.googleusercontent.com\/gS_hyJ6rzM_xrRKH4OLIFbHTcWEFFKKeuhg8AcBrp9oQso8dACrWP28KklvT7KSueHxAsSYQ35ad6cWpVFK4hRvB3oS_OoEHMhlFRHwEAfxqyJR4QaTnd0TdYTiQ3HltCw-0mZdxXFaHoP98a1jiSA\"><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>I had a lot of fun with this lab, and I certainly learned a lot, most importantly I learned that I have a lot more learning to go.<\/p>\n\n\n\n<p>The things I&#8217;m most excited about learning are how to set up an internal network isolated from the internet and other hosts on the network to play with vulnerable machines. I also learned a little bit about linking commands with others in Linux, and I&#8217;ll definitely want to research more of that in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After playing around in TryHackMe rooms for a few months, and inhaling content from John Hammond, Network Chuck, &amp; David Bombal, I decided I wanted to try something a little more involved by setting up my own hacking lab to try and attack a vulnerable machine from Vulnhub. Did a quick google search and found&hellip; <br \/> <a class=\"button small blue\" href=\"https:\/\/chrisintech.com\/index.php\/2023\/04\/17\/sql-injection-lab\/\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ti_tpc_template_sync":false,"_ti_tpc_template_id":""},"categories":[4],"tags":[5,9,6,10,7,12,11,8],"_links":{"self":[{"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":8,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":117,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/posts\/1\/revisions\/117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/media\/104"}],"wp:attachment":[{"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisintech.com\/index.php\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}