Blog
Room Link: https://tryhackme.com/room/blog
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
Kali

TCP/80 - HTTP
Kali

TCP/445 - SMB
Kali

Kali

Kali

Kali

TCP/80 - HTTP
If you go to http://$VICTIM/wp-admin the page redirects to a new page so I add blog.thm into my hosts file and then it worked.


Kali


Hydra was taking too long but wpscan was able to find it quickly.
Kali

After logging in the user couldn't really do anything but I noticed wordpress is on version 5.0

Initial Shell
Kali

Victim

Victim

Tried brute forcing the hashes, we got the password for kwheel again but they aren't a user on the actual server. bjoel I wasn't able to bruteforce.
Kali

Found a pdf in bjoels home directory, after opening it up it looks like he was fired so his account is most likely locked anyways so there may be no point trying to break into it.
Kali(receiving)
Victim(sending)

Privilege Escalation
Victim

This script seems to just check if there is a admin environment variable is set, if it isn't it will exit.
Victim

I add the admin environment variable then right away I got root after running the script
Victim


Last updated