FishyMail Vulnhub Walkthrough

Today, we are sharing another Vulnhub Machine Walkthrough, which is named fishymail. It is a medium level box, this VM is hosted on Vulnhub Server you can download here the machine.

Network Scanning

Let’s start with network scanning, we need to find the target IP Address of the machine. we can discover every alive host our local network by using the netdiscover tool.

FishyMail Vulnhub Walkthrough

Now we have an IP address target machine. my target machine IP address is ( ) and our next step is scanning the target machine all open ports and running services.

FishyMail Vulnhub Walkthrough

Nmap Aggressive scanning output is shown we have 6 services that are running on the target machine, 25/SMTP, 80/HTTP, 443/HTTPS, 2600/SSH, and 3306 running MySQL service.


Since we see target machine port 8080 is open running Apache HTTP Server. Let’s check the webpage in the browser by browsing following the URL.

After checking the robots.txt web page we found three disallow directory, let’s open the directories one by one.

FishyMail Vulnhub Walkthrough

Here, we didn’t find anything to proceed with. Further, we will use the Dirb tool to scan the web directories, finding hidden files of the server.

again run the dirb tool and apply some common extension filter.

FishyMail Vulnhub Walkthrough

As a result of the Directory scan, we found a useful text file, let’s download the page on our local machine using the wget command.

we open the dir.txt file it looks like a base64 encoded string let’s decode the file using the base64 command.

Our file is decoded and we found mail login credentials, let’s try to login SSH console with a valid username and password,

and we login with squidward user After enumeration the directories we found a SQL database file base64 ecnoded.

FishyMail Vulnhub Walkthrough

We move our local machine and copy the SQL database base64 string and save the same name file and try to decode it.

We grep the all username and password hash into a file and try to decrypt these hash online.

FishyMail Vulnhub Walkthrough

Our hash is cracked, we successfully cracked 4 user hash, and again login with SSH console dirtysalmon user.

FishyMail Vulnhub Walkthrough

Privilege Escalation

So, we logged in as dirtysalmon user with the help of cracked passwords, we run the uname -a command for checking machine kernel release and kernel version.

we search for exploit GERNRIC#353 version and we found OpenBSD local privilege escalation exploit let’s copy the code and create a base file target machine. and run it with help of ksh Shell.

Finally we get root shell let’s move the /root directory and read our final flag.

HackathonCTF Vulnhub Walkthough link