dogcat
Room Link: https://tryhackme.com/room/dogcat
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
Kali
TCP/80 - HTTP
Kali
Browser
Kali

Browser
Kali

Browser


Burp

Kali
Burp


Get autocomplete
Privilege Escalation
Exploit: https://gtfobins.github.io/gtfobins/env/


Break out of Docker
We get a hint we're actually in a docker container
Victim

We can see there is a backups folder that tars the contents of /root/container since we have access to edit this file we modify the file with a reverse shell
Victim
Kali


Last updated