Skip to content

Pelican -- Proving Grounds (write-up)

Difficulty: Intermediate Box: Pelican (Proving Grounds) Author: dsec Date: 2025-05-05


TL;DR

Found a vulnerable service with a public exploit on Exploit-DB. Used sudo gcore to dump a process memory and extract credentials. Escalated to root.


Target info

  • Host: Proving Grounds target
  • Services discovered via nmap

Enumeration

Nmap results

Web enumeration

Service enumeration

Further recon

Interesting findings


Initial foothold

Found a public exploit: https://www.exploit-db.com/exploits/48654

Exploit details

Exploit execution

Shell obtained


Privesc

Used sudo gcore to dump process memory:

sudo gcore 486
cat core.486

Core dump

Found password in the dump: ClogKingpinInning731

Password found

Privilege escalation

Root

Make sure to stabilize the shell before running gcore.


Lessons & takeaways

  • sudo gcore can dump process memory, which often contains plaintext credentials
  • Always stabilize your shell before running commands that produce large output
  • Check Exploit-DB for known vulnerabilities when you identify service versions