battery

Room Link: https://tryhackme.com/r/room/battery arrow-up-right

Scans

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/80 - HTTP

Kali

File Inspection

Kali

Kali

Bypass Login Restrictions.

Based off we saw in the file there is a admin user. The username field has a character limit which will stop us from registering a username that is too long but we can try in burp.

The original request. It will fail to register.

We can just add a random character to the end which will cut off and then it will register the user as admin.

We can now login as the admin user

XEE - Read files

Add

Add

We echo and decode the file and we see the creds for the user cyber which we saw above has an account to the OS level of the box.

Kali

TCP/22 - SSH

Kali

Privilege Escalation

Victim

Victim

run.py

Victim

Last updated