CyberLens

Room Link: https://tryhackme.com/r/room/cyberlensp6

Kali

echo $VICTIM cyberlens.thm >> /etc/hosts
cat /etc/hosts

Scans

Initial scan

Kali

nmap -A cyberlens.thm

Longer scan

Kali

TCP/80 - HTTP

Find Pages

Kali

TCP/61777 - HTTP

Find Pages

Kali

The other web server is running Tika 1.17 which has a command injection exploit.

Initial Shell

Kali

Kali #1

Kali #2

I tried to download multiple reverse shells but the problem seemed to be I couldn't save it anywhere so I did a base64 encoded PowerShell reverse shell.

Kali #1

Kali #2

Web Access

Victim

Kali

Privlege Escalation

Load PowerUp.ps1 into memory.

Kali

Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded

PowerUp.ps1

Victim(powershell)

Kali

Kali

Victim(powershell)

Last updated