root@rumais:~# inspect yearoftherabbit
Year of the Rabbit
Linux room covering service enumeration, initial access, and privilege escalation. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.
Room Details
Built from supporting notes and artifacts. This room is grouped under Linux and PrivEsc.
Summary
Year of the Rabbit typically blends web enumeration, hidden content discovery, weak credential handling, and Linux post-exploitation. The common flow is to pivot from the application layer to a shell and then enumerate carefully for the final escalation route.
Notes
Recon
- Initial web enumeration appears ordinary until the static content and media assets are inspected more closely.
- The room deliberately hides the useful path behind redirections, asset references, and content that only becomes obvious after interception and careful review.
Initial Access
- The intended route is to recover the hidden directory from the web flow, extract the FTP username and password material from the staged artifact, and brute-force or validate FTP access.
- Further artifact analysis on the downloaded file yields the SSH credentials for the next user context.
Privilege Escalation
- After the SSH foothold, local enumeration and the hidden
s3cr3tclue expose the path to the next user and finally to root. - The final escalation hinges on a vulnerable
sudopath combined with an allowed editor or delegated command.
Security Notes
- Static assets, redirects, and media files can leak as much as dynamic endpoints when attackers inspect them properly.
- Obscure encodings and esoteric formats are not protection; they only delay basic analysis.
- Old
sudoedge cases and delegated editor access remain dangerous escalation primitives.Collected Output
gobuster-initial
===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://10.10.96.124
[+] Method: GET
[+] Threads: 64
[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.1.0
[+] Timeout: 10s
===============================================================
2021/06/28 23:14:16 Starting gobuster in directory enumeration mode
===============================================================
/assets (Status: 301) [Size: 313] [--> http://10.10.96.124/assets/]
/server-status (Status: 403) [Size: 277]
===============================================================
2021/06/28 23:56:49 Finished
===============================================================
nmap-full-port
# Nmap 7.91 scan initiated Mon Jun 28 23:16:21 2021 as: nmap -sV -p- -oN nmap-full-port 10.10.96.124
nmap-initial
# Nmap 7.91 scan initiated Mon Jun 28 23:10:04 2021 as: nmap -sV -sC -oN nmap-initial 10.10.96.124
Nmap scan report for 10.10.96.124
Host is up (0.49s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.2
22/tcp open ssh OpenSSH 6.7p1 Debian 5 (protocol 2.0)
| ssh-hostkey:
| 1024 a0:8b:6b:78:09:39:03:32:ea:52:4c:20:3e:82:ad:60 (DSA)
| 2048 df:25:d0:47:1f:37:d9:18:81:87:38:76:30:92:65:1f (RSA)
| 256 be:9f:4f:01:4a:44:c8:ad:f5:03:cb:00:ac:8f:49:44 (ECDSA)
|_ 256 db:b1:c1:b9:cd:8c:9d:60:4f:f1:98:e2:99:fe:08:03 (ED25519)
80/tcp open http Apache httpd 2.4.10 ((Debian))
|_http-server-header: Apache/2.4.10 (Debian)
|_http-title: Apache2 Debian Default Page: It works
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Mon Jun 28 23:10:41 2021 -- 1 IP address (1 host up) scanned in 37.09 seconds