Preparing for OSCP | Sharing Practical Labs & Real-World Attack Analysis

Today I explored a vulnerability related to CVE-2025โ€“27136 and practiced enumeration, exploit research, and gaining root access on the target machine.

๐Ÿ”Ž Step 1 โ€” Initial Enumeration

I started with an Nmap scan to discover open ports and running services.

nmap -sCV -A โ€” min-rate 1000 <target-ip>

None

The scan revealed that a proxy server was running on port 8080 and the service name was locals3.

None

๐Ÿ” Step 2 โ€” Vulnerability Research

After identifying the service locals3, I searched for available exploits and found that it is vulnerable to CVE-2025โ€“27136.

cve-2025โ€“27136

This vulnerability allowed reading sensitive files from the system.

None

Got link

None

โš™ Step 3 โ€” Creating the Exploit Payload

To exploit the vulnerability, I created a malicious XML payload.

Payload file:

payload.xml

None

Inside the payload, I attempted to access a sensitive file:

file:///root/.ssh/id_rsa

Same payload in target machine

None

This targeted the root SSH private key on the system.

๐Ÿ“‚ Step 4 โ€” Uploading the Payload

After uploading the payload to the vulnerable service, the exploit successfully retrieved the id_rsa private key from the target machine.

None

๐Ÿ”‘ Step 5 โ€” Using the Private Key

I saved the extracted key locally and set the proper permission:

chmod 600 id_rsa

This allowed me to authenticate via SSH.

None
None

๐Ÿš Step 6 โ€” Root Access

Using the stolen private key, I logged into the system and successfully obtained a root shell.

None
None

๐Ÿง  Topics Covered

  • Nmap Enumeration โ€ข Proxy Service Discovery โ€ข Vulnerability Research โ€ข Exploiting CVE-2025โ€“27136 โ€ข Creating XML Payload โ€ข Extracting Sensitive Files โ€ข Using id_rsa SSH Private Key โ€ข Gaining Root Shell Access

๐ŸŽฅ Full Practical Demonstration For a complete step-by-step video walkthrough, watch here: