Golden Eye 1: CTF Walkthrough, Part 2

In this article, we will continue the “GoldenEye” Capture-The-Flag challenge. This CTF was posted on VulnHub by its author, Creosote. As per the description given by the author, this is an intermediate-level machine designed as one of the OSCP vulnerable machines. The goal of this challenge is to read the flags in the root directory.

We have already set up a pentesting environment for this machine in Part One of this CTF. You can check out the first part of this CTF here.

The target machine IP address for this CTF is 109.168.1.10.

Please Note: The target and attacker machine IP addresses may be different, depending on your network configuration.

In the previous article, we learned to exploit the POP service on the target machine and log in as different users. We also read the emails of different users on the server through the POP3 port. During this, we found a username and password from a user’s email, and there were instructions to make some changes in the etc/hosts file. The email can be seen in the following screenshot.

So let’s proceed from this point.

It’s mentioned in the above message that we need to point the target machine IP address to the given URL in etc/hosts. Let’s do that now.

Command Used:

  • echo 168.1.10 severnaya-station.com >> /etc/hosts (It will add the entry in the host file. The highlighted IP address is the target machine IP address which could be different as per your network configuration.)
  • cat /etc/hosts (To verify the change)

In the above screenshot, we can see that the URL has been successfully added on the target machine. So let’s open this URL on the browser.

After so much effort, we finally have the web application running on the target machine. (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Nikhil Kumar. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/3m8XJCpxs5c/