Gift | HackMyVM
Difficulty = Easy
We can go ahead and start up our VM

Then scan your network using arp-scan

Running our nmap scan we have
# Nmap 7.94 scan initiated Fri Oct 27 02:48:01 2023 as: nmap -p80,22 -sCV -T4 -v --min-rate=1000 -oN nmap.txt 192.168.0.115
Nmap scan report for gift (192.168.0.115)
Host is up (0.00038s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.3 (protocol 2.0)
| ssh-hostkey:
| 3072 2c:1b:36:27:e5:4c:52:7b:3e:10:94:41:39:ef:b2:95 (RSA)
| 256 93:c1:1e:32:24:0e:34:d9:02:0e:ff:c3:9c:59:9b:dd (ECDSA)
|_ 256 81:ab:36:ec:b1:2b:5c:d2:86:55:12:0c:51:00:27:d7 (ED25519)
80/tcp open http nginx
| http-methods:
|_ Supported Methods: GET HEAD
|_http-title: Site doesn't have a title (text/html).
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Oct 27 02:48:13 2023 -- 1 IP address (1 host up) scanned in 12.10 seconds
Navigating to port 80/HTTP we have

Nothing much in page-source so i decided to perform dir/file bruteforce

As we can see no results, made my recon and i decided to bruteforce SSH using the default root account

As we can see we now have the root user password, let go ahead and login via SSH

…..And we are root 🤟