This repository documents the successful penetration test and data exfiltration of the Web Machine: (N7), a vulnerable VM created by Duty Mastr and released on November 3, 2021. The mission utilized a custom exploitation framework, bubble_siphon , to profile the host, identify hidden entry points, and "siphon" sensitive data and flags.
- Name: Web Machine: (N7)
- Difficulty: Medium
- Format: Virtual Machine (VirtualBox - OVA)
- Operating System: Linux
- Network: DHCP enabled (IP automatically assigned)
- Primary Vector: Web-based vulnerabilities
- Infrastructure Check: The lab was configured using bridged networking to ensure direct communication between the Kali Linux attacker machine and the target VM.
- Host Discovery: (
sudo arp-scan -l) identified the target IP within the local subnet.
- Service Profiling: A comprehensive service scan (
nmap -sCV -T4) confirmed that Port 80 (HTTP) was the only open port, identifying the primary attack surface.
- Aggressive Fuzzing: Initial scans with standard wordlists yielded minimal results.
- Endpoint Discovery: Use of DirBuster with a customized dictionary eventually revealed the hidden entry point
/exploit.html.
- Hidden Portal Discovery: Manual reconnaissance and intelligence siphoning identified the
/enter_networkdirectory, which served as an administrative gateway.
- Upload Form Bypass: The
/exploit.htmlform was misconfigured to point tolocalhost. - Manual Request Crafting: This was bypassed using a crafted
curl -X POSTrequest targeting the backend handler,profile.php.
- Information Disclosure: Interacting with the backend directly triggered a partial flag disclosure:
FLAG{N7. - Blind SQL Injection: The login form at
/enter_networkwas found to be vulnerable to SQL injection. - Database Targeting: Using
sqlmapwith--level 3 --risk 3, a time-based blind injection was confirmed on theuserparameter.
- Database Exfiltration:
sqlmapwas used to dump the Machine database and its correspondinglogintable. - Loot Extraction: The final flag and administrator credentials were recovered from the password field of the database.
- Siphon Script Deployment: The
bubble_siphon.shframework was prepared to profile thewww-dataidentity and scavenge the/var/www/directory for configuration secrets such as.envandconfig.phpfiles.
bubble_siphon.sh: Custom post-exploitation framework for scavenging system secrets and SSH keys.- SQLmap: Utilized for automated database siphoning and credential recovery.
- FFUF/DirBuster: Deployed for endpoint discovery and parameter fuzzing.
FLAG{N7:KSA_01}