Escalate My Privilege Walkthrough

Introduction Today we're doing a boot2root pentest walkthrough of the Escalate My Privilege machine, created by Akansha Sachin Verma and hosted at https://www.vulnhub.com/entry/escalate-my-privileges-1,448/ . For this pentest, I will be using two virtual machines. A Kali Linux machine as the attacking system, and the Escalate My Privileges machine as the target system. Locating The Target This machine is configured so that the default login screen indicates the system's IP address on the network. Very nice! Our target system is at 10.0.2.30 . Scanning and Enumeration We start our scans with nmap to determine which TCP ports are open on the target. nmap -T4 -p- 10.0.2.30 Five open ports. We'll plug these open ports into nmap again for a more detailed scan. nmap -T4 -A -p22,80,111,2049,20048 10.0.2.30 phpbash.php seems like a very likely target for a Local File Inclusion (LFI) vulnerability. We will definitely check it out in a bit. Next...