PwnLab - Init CTF write up.

Pwnlab-init is a boot2root vm from vulnhub. The VM and background details can be found here. Once booted, a quick ping sweep via nmap reveals the IP address of the target as 192.168.56.102, and my attacker (Kali linux is on 192.168.56.1).
Running a basic TCP scan of the VM revelled a few services:
# nmap -sT 192.168.56.102
Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-20 21:26 BST
Nmap scan report for 192.168.56.102
Host is up (0.0032s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
80/tcp open http
111/tcp open rpcbind
3306/tcp open mysql
MAC Address: 08:00:27:B8:8C:20 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 0.27 seconds
Doing the next part of recon, I fire up Dirbuster to enumerate the webserver, to see if there is anything interesting on the server. I also open a web browser at the index page.