Hello Everyone, the previous post was walkthrough of level 1 of Kioptrix series. In this blog, I am going to post walkthrough of Kioptrix 1.1 which is 2nd in the series.
So without wasting our time, let’s get started.
Just like the last machine, I was being greeted by this login page. First work was to find the IP Address of my target, Like always I used “netdiscover” and got target IP as 10.0.2.11.
After getting the IP address, next work was to scan the target. I scanned it with the help of “nmap“.
OK so port 80 was open, I browse the port and was greeted by a login page.
I tried blind SQL injection and it worked like charm.
After logging in, I was presented by the interface to Ping IP address which was vulnerable to code execution Vulnerability.
I got a Reverse shell with the help of this .
I started my enumeration and found that the target is vulnerable to this and exploit was also available in Kali.
I compiled the exploit and executed it.
Tadaaaa,I am ROOT..!!
Happy Hunting:)
Visit: Azure Skynet
Visit: CosmicSkills