GoldenEye

Room Link: https://tryhackme.com/room/goldeneye

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/80 - HTTP

Kali

We find a encoded password and also a potential other user, Natalya.

I can login to /sev-home now

TCP/55007 - POP3

Kali

Kali

Kali

Kali

New password still doesn't work but maybe can be used elsewhere.

Kali

Added severnaya-station.com to my hosts file and then navigated to http://severnaya-station.com/gnocertdir as mentioned in the email

Kali

Kali

Kali

It was the password for admin

Initial Shell

Kali

Browser

It kind of worked but the shell kept breaking so I switched it to a python one and did the same thing.

Kali

Browser

Get autocomplete

Privlege Escalation

Just changed below line from gcc to cc as gcc is not installed on the host

Kali

Victim

Last updated