CyberLens
Room Link: https://tryhackme.com/r/room/cyberlensp6
Kali
echo $VICTIM cyberlens.thm >> /etc/hosts
cat /etc/hostsScans
Initial scan
Kali
nmap -A cyberlens.thm
Longer scan
Kali

TCP/80 - HTTP
Find Pages
Kali

TCP/61777 - HTTP
Find Pages
Kali

The other web server is running Tika 1.17 which has a command injection exploit.

Initial Shell
Kali

Kali #1
Kali #2

I tried to download multiple reverse shells but the problem seemed to be I couldn't save it anywhere so I did a base64 encoded PowerShell reverse shell.
Kali #1
Kali #2

Web Access
Victim

Kali

Privlege Escalation
Load PowerUp.ps1 into memory.
Kali
Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded
PowerUp.ps1
Victim(powershell)

Kali
Kali
Victim(powershell)

Last updated