Preparing for OSCP | Sharing Practical Labs & Real-World Attack Analysis
Today I explored a vulnerability related to CVE-2025โ27136 and practiced enumeration, exploit research, and gaining root access on the target machine.
๐ Step 1 โ Initial Enumeration
I started with an Nmap scan to discover open ports and running services.
nmap -sCV -A โ min-rate 1000 <target-ip>

The scan revealed that a proxy server was running on port 8080 and the service name was locals3.

๐ Step 2 โ Vulnerability Research
After identifying the service locals3, I searched for available exploits and found that it is vulnerable to CVE-2025โ27136.
cve-2025โ27136
This vulnerability allowed reading sensitive files from the system.

Got link

โ Step 3 โ Creating the Exploit Payload
To exploit the vulnerability, I created a malicious XML payload.
Payload file:
payload.xml

Inside the payload, I attempted to access a sensitive file:
file:///root/.ssh/id_rsa
Same payload in target machine

This targeted the root SSH private key on the system.
๐ Step 4 โ Uploading the Payload
After uploading the payload to the vulnerable service, the exploit successfully retrieved the id_rsa private key from the target machine.

๐ Step 5 โ Using the Private Key
I saved the extracted key locally and set the proper permission:
chmod 600 id_rsa
This allowed me to authenticate via SSH.


๐ Step 6 โ Root Access
Using the stolen private key, I logged into the system and successfully obtained a root shell.


๐ง Topics Covered
- Nmap Enumeration โข Proxy Service Discovery โข Vulnerability Research โข Exploiting CVE-2025โ27136 โข Creating XML Payload โข Extracting Sensitive Files โข Using id_rsa SSH Private Key โข Gaining Root Shell Access
๐ฅ Full Practical Demonstration For a complete step-by-step video walkthrough, watch here: