As per the above screenshot suggests we need to get SHELL, ROOT and POST EXPLOITATION flag.
An nmap scan gave me pretty much idea about the services.
nmap -sV 192.168.0.122
I checked the webpage on this address, It looks like
I used Dirb for my next step to check all the existing directories and it gave me something useful.
dirb http://192.168.0.122
The website uses wordpress CMS
The website uses Lepton CMS — I didn’t find it of much use here!
I checked the authors for wordpress Found admin as the author or the user for the wordpress!
Now, I visited 192.168.0.122/wordpress/wp-admin for the login panel of wordpress and randomly tried the username as admin and password as admin and it worked!
I Visited Appearences-> Editor and Changed the main index file and added the code of c99 shell on it! So The 1st statement of GETTING A SHELL end here!
Now, I can walk through directories internally and check for the flags.So I went to home directory to check the user directory and found the first flag
The First Flag that I found was in /home/wpadmin/flag.txt directory
The second statement in the very first screenshot says “Get Root Access “. So Now I looked through the scans of nmap and tried to find any vulnerability related to remote execution for getting a root access to the system but got no luck! So I went on and took a look at wp-config file since it contains the database information or could contain any other login details and for DB_user and DB_Password. user: root password: rootpassword!
I used this credential for the ssh login and found another flag!
ssh root@192.168.0.122
So Got the Root Access!
Now the Third flag is POST EXPLOITATION that means it could be anywhere in the OS now that we are in the root! So to find it I have tried find / -name flag and also tried grep -i for Keywords such as post, exploit, flag but got no luck!
Finally tried a regex command to find the md5 hashes in the files in different directories and finally found the 3rd flag!
egrep -r ” [a-z0-9]{32,32}” /etc/
There can be more than one way to solve the Quaoar Virtual Machine Challenge. The Privilege escalation where we have used wp-config file for password obtaining instead of wp-config file we can look for the kernel exploitation code for this VM since it is also vulnerable! You can find the exploit code for this challenge here > https://www.kernel-exploits.com/ .