Sida loo Hacking Gareeyo Thoth-Tech: 1 VulnHub
CTF Challenges

Sida loo Hacking Gareeyo Thoth-Tech: 1 VulnHub

Master advanced techniques and methodologies in ctf challenges

Feb 8, 2026
15 min read
AlphaSploit Team
1.5k views

Overview

Thoth-Tech: 1 waa mashiin heerka fudud (Easy) ah oo loogu talagalay in lagu barto aasaaska baaritaanka network-ka, jebinta erey-siraha (brute-forcing), iyo kor u qaadista xuquuqda (Privilege Escalation).

> ⚠️ Hadhka Digniinta: Maqaalkan waxaa loogu talagalay oo kaliya waxbarasho. Weligaa ha isku dayin inaad jabsato nidaam aadan ogolaansho u haysan.

Machine Information

  • Platform: VulnHub
  • Difficulty: Easy
  • Machine Creator: Pwnlab.me
  • Download: [Thoth-Tech.ova](https://download.vulnhub.com/thothtech/Thoth-Tech.ova)

Step 1: Enumeration (Baaritaanka)

Waxaan ku bilaabaynaa network scan si aan u ogaano IP address-ka mashiinka nugul anagoo isticmaalaya netdiscover:

netdiscover -r 192.168.1.0/24

Xaaladdeyda, IP address-ka waa: 192.168.1.7. Nmap Results Waxaan sii wadnaa enumeration-ka anagoo isticmaalaya Nmap scan si aan u aragno port-yada furan:

nmap -A -sV 192.168.1.7

Waxaan helnay 3 port oo furan. Waxaan go'aansaday inaan ku bilaabo FTP server-ka maadaama uu furan yahay port 21 oo ay ku jirto tilmaan (note.txt). Nmap Results

Step 2: FTP Access

Waxaan u galnay FTP-ga anagoo isticmaalaya anonymous login:

ftp 192.168.1.7
  • Username: anonymous
  • Password: (maran)

Nmap Results

Markaan soo dejisay faylkii note.txt, waxaan helnay hint sheegaya in username-ku yahay pwnlab isla markaana password-ku uu aad u daciif yahay. Nmap Results

Step 3: Foothold (Gudaha u Galka)

Maadaama password-ku uu daciif yahay, waxaan isticmaalay Hydra si aan u brute-force gareeyo SSH-ga anigoo isticmaalaya liiska rockyou.txt:

hydra -l pwnlab -P /usr/share/wordlists/rockyou.txt ssh://192.168.1.7
Nmap Results Taasi waxay ahayd mid degdeg ah! Waxaan helnay credentials-ka: pwnlab : babygirl1.

Step 4: Privilege Escalation (Root Access)

Markaan SSH ugu galnay mashiinka, waxaan iska baarnay sudoers list-ka:

sudo -l
Nmap Results Waxaan ogaannay inaan u ordi karno binary-ga find anagoo ah root iyadoon password nala weydiin. Waxaan isticmaalnay payload-ka GTFOBins:
sudo find . -exec /bin/sh ; -quit

Nmap Results

BOOM! Waxaan helnay Root Shell. Waxaan helnay flag-ga root-ka ee directory-ga /root.

Conclusion

Mashiinkani ma ahayn mid aad u adag, laakiin wuxuu muujinayaa muhiimadda ay leedahay in si fiican loo akhriyo tilmaamaha (hints). Haddii aan ku bilaabi lahaa port 80, waxay u badneyd inaan dhibtoon lahaa.

Waad ku mahadsantihiin akhriska!