Empline

Room Link: https://tryhackme.com/room/empline

Scans

Initial scan

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/80 - HTTP

Kali

Kali

Initial Shell

OpenCats 0.9.4 has a RCE exploit.

Exploit: https://www.exploit-db.com/raw/50585

Kali

Victim

Victim

Victim

Now that we can read both f these files we can transfer them to Kali. I let this run for a while but it wasn't cracking any hashes.

Kali

Kali

I went back to the check the box and found the database credentials

Victim

Kali

Kali(mysql)

There were a few hashes from users so I put them in crackstation and one returned a result.

TCP/22 - SSH

Kali

Privilege Escalation

Since I had access to change any file already I just added a new root user to passwd

Victim

Last updated