netdiscover
1 | sudo netdiscover |

rustscan
1 | rustscan -a 192.168.0.24 |

On the port 80 we have this page:

gobuster
1 | gobuster dir -t 100 -u http://192.168.0.24 -w ~/Documents/wordlist/directory-list-medium.txt --wildcard switch |

The javascript directory is forbiden:

There is a phpmyadmin page, let’s see if there is a index.php.
MD5 hash

1 | echo -n beelzebub | md5sum |

This string is a directory.
Beelzebub website
There is something but I can’t see it, the ip is hard coded in the website.

This in a wordpress website, I should see what is in the upload directory:
http://192.168.0.24/d18e1e22becbd915b45e0e655429d487/wp-content/uploads/

If you browse to Talk To VALAK you can see this page:

You can also found a password:
1 | Cookie=b7d0eff31b9cde9a862dc157bb33ec2a; Password=M4k3Ad3a1 |
I should do a scan on the word press website but it’s taking too much time to load, I will find the user on the login page of the VM.
User: Krampus
Password: M4k3Ad3a1
ssh
1 | ssh [email protected] |
Yes I’m in.
1 | cat .bash_history |
I’m will copy past this:

I’m root.

Flag: 8955qpasq8qq807879p75e1rr24cr1a5