In this video walkthrough, I solved a CTF challenge designed to resemble OSCP Lab machines and The machine name is Photographer from Vulnhub. We started with Nmap scanning to discover open ports and running services and from there we found a vulnerable version of Koken CMS which enabled us to gain remote access. Then we did privilege escalation through looking for SUID bit-binaries
This machine was developed to prepare for OSCP. It is boot2root, tested on VirtualBox (but works on VMWare) and has two flags: user.txt and proof.txt.
- Privilege Escalation through SUID bit permissions exploitation
- Koken CMS