Archangel
Room Link: https://tryhackme.com/room/archangel
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found
Kali
TCP/80 - HTTP
Kali


I added mafialive.thm to my host file and tried visiting the browser from there
Kali

Kali


Kali

Kali

Burpe Request
By changing the user agent I was able to start running commands
Before
After

Reverse Shell
Kali
Command being sent
Burp request
Only notable thing is to url encode the command being sent
Get autocomplete

Shell - archangel
Kali
Victim




Get autocomplete
Privilege Escalation
Victim

We can see with strings that the program is running a cp command but it isn't using the full pathm we can use this.

Victim

Last updated