Jan. 16, 2024, 4:13 a.m. | dollarboysushil

InfoSec Write-ups - Medium infosecwriteups.com

Link to vulnhub: https://www.vulnhub.com/entry/lemonsqueezy-1,473/

Difficulty:

Intermediate

Goal:

Read flag user and root flag

NOTE: add lemonsqueezy to your hosts. It’s easypeasy!

Victim IP: 192.168.1.133
Attacker IP (Kali Linux): 192.168.1.128

Reconnaissance

nmap -sC -sV 192.168.1.133
-sC for default scripts,-sV for version enumeration and -p- to scan all ports.

Looking at the result we can see only one service (http) running on porn 80.

Visiting the ip, we can see apache2 default page.

After running gobuster we can see, some directory. Among …

cybersecurity ethical hacking oscp vulnhub

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)