secret.zip
charix@poison:~ % ls -la
total 48
drwxr-x--- 2 charix charix 512 Mar 19 2018 .
drwxr-xr-x 3 root wheel 512 Mar 19 2018 ..
-rw-r----- 1 charix charix 1041 Mar 19 2018 .cshrc
-rw-rw---- 1 charix charix 0 Mar 19 2018 .history
-rw-r----- 1 charix charix 254 Mar 19 2018 .login
-rw-r----- 1 charix charix 163 Mar 19 2018 .login_conf
-rw-r----- 1 charix charix 379 Mar 19 2018 .mail_aliases
-rw-r----- 1 charix charix 336 Mar 19 2018 .mailrc
-rw-r----- 1 charix charix 802 Mar 19 2018 .profile
-rw-r----- 1 charix charix 281 Mar 19 2018 .rhosts
-rw-r----- 1 charix charix 849 Mar 19 2018 .shrc
-rw-r----- 1 root charix 166 Mar 19 2018 secret.zip
-rw-r----- 1 root charix 33 Mar 19 2018 user.txt
After gaining a foothold, I came across an interesting archive file at the home directory; /home/charix/secret.zip
┌──(kali㉿kali)-[~/archive/htb/labs/poison]
└─$ unzip secret.zip
archive: secret.zip
[secret.zip] secret password: Charix!2#4%6&8(0
extracting: secret
I transferred the file to Kali for further enumeration
I was able to extract the secret
file from the archive with the password of the charix
user
Password reused
┌──(kali㉿kali)-[~/archive/htb/labs/poison]
└─$ file secret
secret: Non-ISO extended-ASCII text, with no line terminators
┌──(kali㉿kali)-[~/archive/htb/labs/poison]
└─$ cat secret
��[|Ֆz!
well it’s something