EW_Skuzzy:1 VM Walkthrough

for the EW_Skuzzy:1 VM hosted on Vulnhub from vortexau.

I would have had a hard time with a lot of this VM if it weren’t for some very well-written resources found online. I didn’t however find the third flag because decryption wasn’t something that excited me that much and I was feeling lazy, I’ll revisit it when there are less VMs waiting I think.

I started with the -A option on nmap this time round:

Port 80 is pretty standard but 3260 was new to me. Nikto doesn’t find anything on 80 so we’ll visit it through the browser:

The main page gives us some advice and asks us to fire up dirbuster, so I do that:

We find an smblogin page, but I didn’t end up doing anything with that.

Now let’s look at that iscsi port; this resource helped me through this stage:

https://www.pentestpartners.com/blog/an-interesting-route-to-domain-admin-iscsi/

So following this guide, we first run the discovery:

and then attempt to login, which is successful:

I initially got a bit lost at this point trying to mount the new drive, but the thing was in my file explorer anyway…

And inside that we find some files:

The first is flag 1 and the second is a disk image:

So when we mount the disk image we get an encrypted CSV and and email giving clues on how to decrypt the sha256 CSV using openssl :

and the email, which contains flag 2:

Written on March 21, 2017