root@rumais:~# inspect res

Res

Linux room covering service enumeration, initial access, and privilege escalation. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.

Room Details

Built from supporting notes and artifacts. This room is grouped under Linux and PrivEsc.

Linux and PrivEsc 2 docx note 1 command artifact

Summary

Linux room covering service enumeration, initial access, and privilege escalation. Use the recovered artifacts below as the evidence base for enumeration, access development, and post-exploitation review.

Notes

Recon

  • This room follows the usual Linux boot-to-root pattern where service enumeration and artifact review reveal the access path.
  • Res rewards careful note-taking and stepwise validation rather than trial-and-error execution.

Initial Access

  • The initial foothold comes from exposed services, leaked files, or weak credentials rather than blind exploitation.
  • The room path becomes clear once the recovered artifacts and service behavior are linked together.

Privilege Escalation

  • Privilege escalation depends on local enumeration, trust abuse, writable automation, or delegated execution paths on the host.
  • After the foothold, local context matters more than noisy exploitation.

Security Notes

  • The defensive lesson is that Linux post-exploitation paths are usually avoidable with better secret handling and tighter local permissions.

    Collected Output

nmap-initial

# Nmap 7.91 scan initiated Sun Jun 20 22:16:05 2021 as: nmap -sS -sV -sC -vv -oN ./nmap-initial 10.10.156.36
Nmap scan report for 10.10.156.36
Host is up, received timestamp-reply ttl 61 (0.61s latency).
Scanned at 2021-06-20 22:16:07 IST for 110s
Not shown: 999 closed ports
Reason: 999 resets
PORT   STATE SERVICE REASON         VERSION
80/tcp open  http    syn-ack ttl 61 Apache httpd 2.4.18 ((Ubuntu))
| http-methods: 
|_  Supported Methods: POST OPTIONS GET HEAD
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jun 20 22:17:58 2021 -- 1 IP address (1 host up) scanned in 112.99 seconds