Walkthrough of vmdak

Introduction

Hello everyone! I'm back with another walkthrough. This time, I tackled "VMDak," an intermediate-level Linux box from OffSec Proving Grounds. This box offered a unique challenge, requiring a series of steps after gaining initial user access.

Let's jump into the hacking process. As always, we started with some initial reconnaissance, beginning with an Nmap scan. The scan revealed open ports: 21, 22, 80, and 9443, giving us multiple avenues to investigate further.

An image to describe post

Port 21:

Starting with port 21, we tested anonymous login and successfully accessed the FTP server. While browsing the FTP directory, we found a file named config.xml, which we downloaded for further analysis.

An image to describe post

Examining config.xml initially didn’t reveal anything notable, but it did indicate the path to the Jenkins initial admin password, a potentially valuable discovery.

An image to describe post

Port 80:

Port 80 displayed the standard Apache2 welcome page with no additional information of interest.

An image to describe post

Port 9443:

Moving on to port 9443, we found a web application—a prison management system. However, accessing the Admin dashboard redirected us to a login page.

An image to describe post

An image to describe post

Upon researching vulnerabilities for this system, we identified a known SQL injection vulnerability in its login page.

Reference: OffSec's Exploit Database Archive
Vulnerability: Prison Management System - SQL Injection Authentication Bypass

Using this SQL injection technique, we bypassed authentication and successfully logged into the application.

An image to describe post