Chill Hack
Room Link: https://tryhackme.com/room/chillhack
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found.
Kali

TCP/80 - HTTP
Kali


A lot of commands ran will result in this page.

Command Injection
Used this to find a way to bypass the filter. by adding a \ in the middle of the first command, it treats the command as a new line so it allows us to run any command we want.
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
Web
Kali
Victim


Victim

Victim(apaar)
Victim(apaar)


Pivot
Kali
Victim
Kali
proxychains.conf
Kali

I can now see the webpage from Kali but no login credentials to use.

Found credentials for mysql in one of the php files.
Victim(apaar)

Victim(apaar)
Victim(mysql)



Both set of credentials work on the login page, both bring up this page.

Used no password
Kali

Cracking Password Protected Zip Files
Kali

Kali

Kali

Victim(apaar)

Privilege Escalation
anurodh is apart of a docker group which the other user was not apart of, looking at gtfo bins theres a way to get a shell so I tried it and got root
Link: https://gtfobins.github.io/gtfobins/docker/#shell
Victim(anurodh)

Last updated