Post

InfoSec Prep OSCP

Description ⤵️

💡 InfoSec Prep: OSCP ⤵️

This box should be easy. This machine was created for the InfoSec Prep Discord Server (https://discord.gg/RRgKaep) as a give way for a 30d voucher to the OSCP Lab, Lab materials, and an exam attempt.

The box was created with VMWare Workstation, but it should work with VMWare Player and Virtualbox. Upon booting up it should display an IP address. This is the target address based on whatever settings you have. You should verify the address just incase.

Find the flag.txt in /root/ and submit it to the TryHarder bot on Discord to enter the give away. The command is only available for so long. So if you are just joining the server or doing the box for fun, the command would not be there any longer at a later time.

Please do not publish any write ups for this box until August 7, 2020 as this is probably when the give away will end. After that, fair game!

A big thanks to Offensive Security for providing the OSCP voucher.

Box created by FalconSpy with the support of the staff at InfoSec Prep Discord Server

This works better with VirtualBox rather than VMware. ## Changelog 2020/07/10 - v1.0.1 - Fixed IP issue 2020/07/11 - v1.0.0

Let’s find the IP Address first »

77-1.png

1
IP : 10.0.2.20

Port Scan Results ➡️

89-1.png

89-2.png

1
2
3
4
OPEN PORTS >
22    SSH
80    HTTP
33060 mysql

Web Enumeration ⤵️

90-1.png

90-2.png

90-3.png

This is base64 lets see what it says →

I get a private key →

90-4.png

Now lets try Shell with this private key →

1
Commands →  ssh oscp@10.0.2.21 -i private_key_openssl

91-1.png

91-2.png

1
wordpress : Oscp12345!

91-3.png

As found in SGID →

91-4.png

91-5.png

91-6.png

1
flag.txt → d73b04b0e696b0945283defa3eee4538

If you have any questions or suggestions, please leave a comment below. Thank You !

This post is licensed under CC BY 4.0 by the author.