Logo
Web01
Ch4os1@web01:~/writeups/Popcorn
← Back to all write-ups

Popcorn

Lab Details

Tasks

Q1: How many TCP ports are listening on Popcorn?

Q2: What is the relative path on the webserver to a file sharing service?

[Status: 301, Size: 312, Words: 20, Lines: 10, Duration: 319ms]
    * FUZZ: torrent

Q3: What HTTP request header is being used to filter uploaded content?

...
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 4613
Content-Type: text/html
...

Q4: What user is the webserver running as?

torrent -t -u "http://tracker1.com/announce" -s newtorrent.torrent myfile
Create hash table: 1/1
Create metainfo file test.torrent successful.

Q5: Submit the flag located in the george user's home directory.

Q6: What is the 2010 CVE ID for a privilege escalation vulnerability in Linux PAM having to do with the message of the day?

╔══════════╣ Executing Linux Exploit Suggester
╚ https://github.com/mzet-/linux-exploit-suggester
...
[+] [CVE-2010-0832] PAM MOTD

   Details: https://www.exploit-db.com/exploits/14339/
   Exposure: probable
   Tags: [ ubuntu=9.10|10.04 ]
   Download URL: https://www.exploit-db.com/download/14339
   Comments: SSH access to non privileged user is needed
...

Q7: Submit the flag located in the root user's home directory.

Lesson Learned