Boot2Root est une machine virtuelle. Le but est d’obtenir un accès root en trouvant deux failles différentes. Le challenge combine plusieurs vecteurs d’attaque, notamment du reverse engineering, des failles web comme des injections SQL, ainsi que la possibilité d’exploiter un upload de fichier PHP pour obtenir une exécution de code à distance.
Boot2root Scan Nmap Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-13 09:31 UTC Nmap scan report for 192.168.56.101 Host is up (0.00028s latency). Not shown: 994 closed tcp ports (reset) PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.0.8 or later |_ftp-anon: got code 500 "OOPS: vsftpd: refusing to run with writable root inside chroot()". 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.7 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 07:bf:02:20:f0:8a:c8:48:1e:fc:41:ae:a4:46:fa:25 (DSA) | 2048 26:dd:80:a3:df:c4:4b:53:1e:53:42:46:ef:6e:30:b2 (RSA) |_ 256 cf:c3:8c:31:d7:47:7c:84:e2:d2:16:31:b2:8e:63:a7 (ECDSA) 80/tcp open http Apache httpd 2.2.22 ((Ubuntu)) |_http-title: Hack me if you can |_http-server-header: Apache/2.2.22 (Ubuntu) 143/tcp open imap Dovecot imapd |_imap-capabilities: more capabilities IDLE IMAP4rev1 STARTTLS LOGINDISABLEDA0001 have post-login listed OK SASL-IR LOGIN-REFERRALS LITERAL+ ID Pre-login ENABLE |_ssl-date: 2025-02-13T09:32:31+00:00; -1s from scanner time. 443/tcp open ssl/http Apache httpd 2.2.22 |_ssl-date: 2025-02-13T09:32:31+00:00; -1s from scanner time. | ssl-cert: Subject: commonName=BornToSec | Not valid before: 2015-10-08T00:19:46 |_Not valid after: 2025-10-05T00:19:46 |_http-server-header: Apache/2.2.22 (Ubuntu) |_http-title: 404 Not Found 993/tcp open ssl/imaps? |_ssl-date: 2025-02-13T09:32:31+00:00; -1s from scanner time. | ssl-cert: Subject: commonName=localhost/organizationName=Dovecot mail server | Not valid before: 2015-10-08T20:57:30 |_Not valid after: 2025-10-07T20:57:30 No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=7.95%E=4%D=2/13%OT=21%CT=1%CU=38008%PV=Y%DS=2%DC=T%G=Y%TM=67ADBC3 OS:0%P=x86_64-unknown-linux-gnu)SEQ(SP=11%GCD=FA00%ISR=9C%TI=I%CI=I%TS=U)OP OS:S(O1=MFFC8%O2=MFFC8%O3=MFFC8%O4=MFFC8%O5=MFFC8%O6=MFFC8)WIN(W1=FFFF%W2=F OS:FFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FFFF)ECN(R=Y%DF=N%T=40%W=FFFF%O=MFFC8%CC= OS:N%Q=)T1(R=Y%DF=N%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=N%T= OS:FF%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=N%T=40%W=FFFF%S=Z%A=S+%F=AR%O=%R OS:D=0%Q=)T6(R=Y%DF=N%T=FF%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T= OS:FF%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=N) Scan Dirbuster Dir found: /cgi-bin/ - 403 Dir found: /forum/ - 200 Dir found: /icons/ - 403 Dir found: /phpmyadmin/ - 200 File found: /forum/index.php - 200 Dir found: /forum/themes/ - 200 Dir found: /forum/themes/default/ - 200 Dir found: /forum/themes/default/images/ - 200 Dir found: /forum/js/ - 200 File found: /forum/js/main.min.js - 200 File found: /phpmyadmin/url.php - 200 File found: /phpmyadmin/Documentation.html - 200 Dir found: /webmail/ - 302 Forum Index ...