Empline
Room Link: https://tryhackme.com/room/empline
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/80 - HTTP
Kali



Kali

Initial Shell
OpenCats 0.9.4 has a RCE exploit.
Exploit: https://www.exploit-db.com/raw/50585
Kali

Victim

Victim


Victim
Now that we can read both f these files we can transfer them to Kali. I let this run for a while but it wasn't cracking any hashes.
Kali
Kali
I went back to the check the box and found the database credentials
Victim


Kali
Kali(mysql)
There were a few hashes from users so I put them in crackstation and one returned a result.

TCP/22 - SSH
Kali
Privilege Escalation
Since I had access to change any file already I just added a new root user to passwd
Victim

Last updated