Archangel

Room Link: https://tryhackme.com/room/archangelarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found

Kali

TCP/80 - HTTP

Kali

I added mafialive.thm to my host file and tried visiting the browser from there

Kali

Kali

Kali

Kali

Burpe Request

By changing the user agent I was able to start running commands

Before

After

Reverse Shell

Kali

Command being sent

Burp request

Only notable thing is to url encode the command being sent

Get autocomplete

Shell - archangel

Kali

Victim

Get autocomplete

Privilege Escalation

Victim

We can see with strings that the program is running a cp command but it isn't using the full pathm we can use this.

Victim

Last updated