CMesS

Room Link: https://tryhackme.com/room/cmessarrow-up-right

Initial Scan

Kali

nmap -A cmess.thm

Scan all ports

Kali

TCP/80 - HTTP

Kali

Mostly junk

Fuzzing Domains

Fuzzed with a long subdomain list then filtered to reduce the amount of results. Only one stands out, dev.

Kali

I added dev.cmess.thm to my host file and found this page

We were able to login to the admin portal with these credentials

Initial Shell

Exploit: https://www.exploit-db.com/raw/51569arrow-up-right

The shell they use is bad so I upload a new one to get a reverse shell instead

Shell Link: https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.phparrow-up-right

Kali

Get autocomplete

We find andre's password in a backup file

Victim

TCP/21 - SSH

Kali

Privlege Escalation

Exploit: https://gtfobins.github.io/gtfobins/tar/arrow-up-right

Victim

Victim

shell.sh

Victim

Last updated