dogcat

Room Link: https://tryhackme.com/room/dogcatarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/80 - HTTP

Kali

Browser

Kali

Browser

Kali

Browser

Burp

Kali

Burp

Get autocomplete

Privilege Escalation

Exploit: https://gtfobins.github.io/gtfobins/env/arrow-up-right

Break out of Docker

We get a hint we're actually in a docker container

Victim

We can see there is a backups folder that tars the contents of /root/container since we have access to edit this file we modify the file with a reverse shell

Victim

Kali

Last updated