CMesS
Room Link: https://tryhackme.com/room/cmess
Initial Scan
Kali
nmap -A cmess.thm
Scan all ports
Kali

TCP/80 - HTTP
Kali
Mostly junk


Fuzzing Domains
Fuzzed with a long subdomain list then filtered to reduce the amount of results. Only one stands out, dev.
Kali

I added dev.cmess.thm to my host file and found this page

We were able to login to the admin portal with these credentials

Initial Shell
Exploit: https://www.exploit-db.com/raw/51569


The shell they use is bad so I upload a new one to get a reverse shell instead
Shell Link: https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php

Kali

Get autocomplete
We find andre's password in a backup file
Victim

TCP/21 - SSH
Kali

Privlege Escalation
Exploit: https://gtfobins.github.io/gtfobins/tar/
Victim

Victim
shell.sh
Victim

Last updated