Vulnhub – Driftingblues 7 – Walkthrough – Writeup

I am going to do the walkthrough of driftingblues7 from vulnhub in this blog post.

Link to the machine:,680/

Link to the walkthrough of driftingblues 6: Vulnhub – Driftingblues 6 – Walkthrough – Writeup


sudo netdiscover -i eth0 -r


nmap -v -T4 -p- -sC -sV --min-rate=1000

So, we have three http servers here. Now, I am going to enumerate the directories using gobuster.


I will exclude php because we know that the server is hosted in python. So, I guess there is a very low probability of finding a php file here.

gobuster dir -u -x html,txt,bak --wordlist /usr/share/wordlists/dirb/common.txt -q

I got a .bash_history file. So, I am going to see the content of the file using curl.


Furthermore, the gobuster also found out the flag.txt file. Now, let’s get that.

Is this over? I don’t think so because as seen from the bash history file, the author of the machine had copied the root flag from another machine and renamed it.

Now, I ran the gobuster with a different wordlist.

gobuster dir -u -x htm,txt --wordlist /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt

It took a lot to finish the directory browsing. I found a path /eon. When I did the curl, I found out some encoded code which I decoded using base64. When I decoded the text it looked like it is a file.

I looked up in the internet and found a website to decode the file.

The file is a zip file which is encrypted. So, we are going to use zip2john and john the ripper to crack the hash.

john the ripper

zip2john | tee hash
john hash --wordlist=/home/kali/rockyou.txt

Now, we cracked the zip password and from the zip we have the credentials for the website hosted at port 80.

After I logged in to the website, I decided to search exploits for eyes of network.

There seems to be an exploit for the version of eyes of network. So, I decided to copy the exploit in my working directory and run it.

cp /usr/share/exploitdb/exploits/php/webapps/48025.txt ./
python3 -ip -port 4444 -user admin -password <use password here>

I got the access as root.

cd /root
cat flag.txt

0 0 votes
Article Rating
Notify of
Inline Feedbacks
View all comments