Subscribe to Blog via Email



CTF Challenges

Tr0ll: 3 Vulnhub Walkthrough

Today we are going to solve another CTF challenge called “Tr0ll: 3” which is a part of Tr0ll series. It is available on Vulnhub for the purpose of online penetration practices. This lab is not that difficult if we have the proper basic knowledge of Penetration Testing. This credit of making this lab goes to Maleus. Let’s start and learn how to successfully breach it.

Level: Intermediate

Since these labs are available on the Vulnhub Website. We will be downloading the .ova file from this link.

Penetration Testing Methodology

  • Scanning
  • Enumeration
  • Exploiting
  • Post Enumeration & Exploitation
  • Privilege Escalation
  • Capture the flag



We will be running this lab in a Virtual Machine Player or Virtual Box.  After running the lab, we used the netdiscover command to check the IP Address of the lab. 

This was found out to be

Now we will run an aggressive scan using nmap for proceed further. 

From its result, I found only port 22 was open for ssh.


Note: when the host machine will turn power, you will notice login: start:here which might be helpful in ssh login.


Assuming above enumerated credential could be useful for taking access of host machine thus we will use Metasploit for login into ssh.

By executing the above command we have initially compromised the host machine as now we have access of remote shell. Therefore further we will try to upload “ script” for post enumeration.

Post Enumeration & Exploitation

But LinEnum couldn’t help and thus we tried to enumerate writable file that have ALL permissions “0777” using the find command as given below. 

And we found two interesting file one was a “.cap file”  (wytshadow.cap) and other was “text file” (gold_star.txt). So, we download these files using the meterpreter as given below.

As we have the .cap file, It can be opened with Wireshark, and we found that all the packets have the Protocol marked as “802.11” and captured traffic looks like wireless network packet because as we all know 802.11 is the protocol used for transmission of the packet between wireless connected devices.

Hmm!! Here aircrack-ng might be helpful for us in extracting the password. And here we can use gold_star.txt file along with  wytshadow.cap  as shown in the image given below.

Great!! The aircrack-ng gave us the password gaUoCe34t1.

As we have obtained the password therefore we switch into another the account say “wytshadow’s account” using credential- wytshadow:gaUoCe34t1

After successfully logging in, we checked the directories and file list of “/” directory and notice a file named as “ohhfun” having SUID bit thus it has permission to run as root.

With this in mind, we ran the file as shown in the given figure. Here you can see that it is pointing toward the LYNX by executing a text message continuously. 

Lynx is a command-line browser and maybe it will have to do something further.

Then with looked for sudo rights for Wytshadow and saw that nginx is available to run as root.

We traversed into the nginx directory and open its config file “sites-enabled sites” file. We see that we have the user agent as Lynx which is listening on 8080. 

Further, we started the nginx service as shown in the given image. Using the netstat command we saw port 8080 opened. This was not opened when we attempted the nmap scan.

As discussed earlier, we are going to install a lynx browser in our local machine. We are going to open the page associated to port we just opened.


On opening the link given on the page through lynx, we find these login credentials. That’s was not that difficult. Was it?

Credentials Found:

As we have one more credential let’s switch into genphlux’s user using above enumerated cred.

After logging in, we found a file named maleus as shown in the given image and by exploring this file we saw it stores RSA key.

Thus we copied the RSA key in a text file, named as “key” and assign permission 600 that to be accessed by the specific user only.

After successfully logging in, we found a file named “don’t_even_bother” that has full permissions and with the help of file we identify its type, it came out to be ELF 64-bit moreover we found another file “.viminfo” file in the same directory.

further, we used the cat command to inspect the viminfo file. On close inspection, we found a password for another user “B^slc8I$”. This is a good discovery.

Privilege Escalation

Now that we have the password, let’s identify the sudo rights for maleus. 

After running the following command, we find that maleus can run don’t_even_bother file as root. So in order to escalate privilege on this machine, we are going to use this file for injecting our malicious code. Let’s first, empty the contents of this file using echo and edit it using nano command.

Now, after opening this file, we wrote this small .C script which will invoke a shell on executing after its compilations.

Now, we as it is “.c” file, we will have to compile it using the gcc compiler and then execute it along sudo permissions.

Yuppieee!! we root it successfully, Let’s capture the final flag.

Author: Pavandeep Singh is a Technical Writer, Researcher and Penetration Tester Contact here

3 thoughts on “Tr0ll: 3 Vulnhub Walkthrough

  1. Question, in the part where you’re supposed to copy the RSA key and transfer it to the host machine. How did you do this? SInce the target is only command line, I was not able to figure out how to get the copy from the target to the host. I though I got it to work using SCP, but it turned out that it didn’t work. I know prob a newb question, but I’m trying to learn as much as I can. Thanks again for doing these walkthroughs, they’re very helpful in the learning process.

    1. Hey, you can just select it on terminal using your mouse and then CTRL + SHIFT + C and then paste it on your file. That’s what I did.

Leave a Reply

Your email address will not be published. Required fields are marked *