battery
Room Link: https://tryhackme.com/r/room/battery
Scans
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/80 - HTTP
Kali

File Inspection

Kali

Kali


Bypass Login Restrictions.
Based off we saw in the file there is a admin user. The username field has a character limit which will stop us from registering a username that is too long but we can try in burp.

The original request. It will fail to register.

We can just add a random character to the end which will cut off and then it will register the user as admin.

We can now login as the admin user


XEE - Read files


Add

Add

We echo and decode the file and we see the creds for the user cyber which we saw above has an account to the OS level of the box.
Kali

TCP/22 - SSH
Kali
Privilege Escalation
Victim

Victim
run.py
Victim

Last updated