root@rumais:~# inspect bountyhacker

Bounty Hacker

Linux room covering service enumeration, initial access, and privilege escalation. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.

Room Details

Built from supporting notes and artifacts. This room is grouped under Linux and PrivEsc.

Linux and PrivEsc 3 docx note 1 command artifact

Summary

Public walkthroughs consistently solve Bounty Hacker by enumerating FTP, SSH, and HTTP, extracting a task list from exposed content, using the recovered wordlist against SSH, landing a low-privilege shell, and escalating with a sudo-allowed GTFOBins path.

multi-service enumeration artifact-based credential discovery SSH brute-force Linux privilege escalation

Notes

Recon

  • Initial enumeration exposes ftp, ssh, and http, which maps the room as a classic Linux multi-service target.
  • Anonymous or weakly protected content on the exposed services leaks the task list and the first useful username context.

Initial Access

  • The recovered task list and password candidates point directly toward an SSH credential attack.
  • The intended path is to validate the wordlist material against the user account and convert that into an SSH foothold.

Privilege Escalation

  • After landing the user shell, local enumeration reveals a sudo-allowed binary or command path that can be abused for escalation.
  • The final step is a straightforward GTFOBins-style move from user to root.

Security Notes

  • Small operational notes can expose enough context to collapse the attacker’s enumeration time.
  • Reused or weak credentials turn even a short wordlist into a practical remote-access path.
  • Sudo delegation should always be reviewed with shell-escape paths in mind.

Supporting Files

Locks

rEddrAGON ReDdr4g0nSynd!cat3 Dr@gOn$yn9icat3 R3DDr46ONSYndIC@Te ReddRA60N R3dDrag0nSynd1c4te dRa6oN5YNDiCATE ReDDR4g0n5ynDIc4te R3Dr4gOn2044 RedDr4gonSynd1cat3 R3dDRaG0Nsynd1c@T3 Synd1c4teDr@g0n reddRAg0N REddRaG0N5yNdIc47e Dra6oN$yndIC@t3 4L1mi6H71StHeB357 rEDdragOn$ynd1c473 DrAgoN5ynD1cATE ReDdrag0n$ynd1cate Dr@gOn$yND1C4Te RedDr@gonSyn9ic47e REd$yNdIc47e dr@goN5YNd1c@73 rEDdrAGOnSyNDiCat3 r3ddr@g0N ReDSynd1ca7e

Task

1.) Protect Vicious. 2.) Plan for Red Eye pickup on the moon. -lin

Collected Output

nmap-initial

# Nmap 7.91 scan initiated Thu Jun 24 15:36:58 2021 as: nmap -sV -sC -oN nmap-initial 10.10.178.83
Nmap scan report for 10.10.178.83
Host is up (0.52s latency).
Not shown: 967 filtered ports, 30 closed ports
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_Can't get directory listing: TIMEOUT
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to ::ffff:10.2.54.48
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 3
|      vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 dc:f8:df:a7:a6:00:6d:18:b0:70:2b:a5:aa:a6:14:3e (RSA)
|   256 ec:c0:f2:d9:1e:6f:48:7d:38:9a:e3:bb:08:c4:0c:c9 (ECDSA)
|_  256 a4:1a:15:a5:d4:b1:cf:8f:16:50:3a:7d:d0:d8:13:c2 (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Jun 24 15:38:20 2021 -- 1 IP address (1 host up) scanned in 82.49 seconds