Rather than provide a full walk through and give the game away, I’ll just provide an outline. (https://www.vulnhub.com/entry/five86-1,417/)

So, something like:

  1. Discover IP with netdiscover or arp-scan

  2. nmap scan services

  3. Explore http services

  4. Look for a known exploit

  5. Gain RCE

  6. Explore filesystem, services, perms

  7. Crack a password with hashcat

  8. SSH Login as a user and get a proper shell

  9. Explore filesystem, services, perms

  10. Consider options. Hint: (A->B, B->A)

  11. Gain access to another users shell

  12. Explore filesystem, services, perms

  13. Gain access to another users shell

  14. Explore filesystem, services, perms

  15. Root access!

Next up: https://www.vulnhub.com/entry/five86-2,418/