This document provides a walkthrough of attacking a boot2root virtual machine to gain root access. It describes enumerating the target to find open ports and services, identifying vulnerabilities in the WordPress site, FTP service, and OpenSSH. The WordPress login is brute forced using default credentials. An exploit is used against the FTP service through Metasploit to gain a limited shell, which is then upgraded to a root shell using Python. The goal of fully compromising the target remotely and obtaining root access is achieved through exploiting vulnerabilities in FTP, HTTP, and WordPress.
Related topics: