πŸ”‘ Initial Access

1. Database Interaction

I gained access directly to the database layer by connecting to the exposed MariaDB service. No authentication was required for the root user.


2. Data Exfiltration

I queried the discovered tables to locate sensitive information.

  • Inspecting users table:
select * from users;

Found several user records with email addresses.

  • Inspecting config table:
select * from config;

Found the machine’s flag stored in the value column for the flag record.


Next Step