Writeup by wook413

Enumeration

Nmap

I kicked things off by performing a full TCP port scan

Following the initial scan, I ran a targeted scan on the open ports.

Lastly, I performed a UDP scan.

Initial Access

HTTP - 8000

Whenever I see an HTTP service running on a port, I usually run an Nmap script before opening it in a browser. This often revealed hidden paths for me.

Surprisingly, the service on port 8000 was a web-based terminal (ttyd), providing immediate shell access without further exploitation.

image-20260128203838951

Privilege Escalation

ss shows that there’s a service running internally on port 65432.

Then I ran pspy. A specific process stood out in the pspy output: a Python script /opt/rpc.py being executed with root privileges.

image-20260128203848323

I read the code inside the file /opt/rpc.py and the last line of the file is connecting to port 65432.

A search for rpc.py in Searchsploit yielded a promising RCE exploit.

I downloaded the exploit and modified the main function to include a busybox reverse shell payload targeting my Kali listener on port 65432.

image-20260128203901367

After executing the modified exploit, I successfully caught a root-level reverse shell using Penelope.

Found root.txt