GoldenEye
Room Link: https://tryhackme.com/room/goldeneye
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
Kali

TCP/80 - HTTP
Kali



We find a encoded password and also a potential other user, Natalya.


I can login to /sev-home now

TCP/55007 - POP3
Kali

Kali

Kali

Kali


New password still doesn't work but maybe can be used elsewhere.
Kali



Added severnaya-station.com to my hosts file and then navigated to http://severnaya-station.com/gnocertdir as mentioned in the email



Kali
Kali




Kali

It was the password for admin
Initial Shell
Kali
Browser


It kind of worked but the shell kept breaking so I switched it to a python one and did the same thing.
Kali
Browser


Get autocomplete
Privlege Escalation
Just changed below line from gcc to cc as gcc is not installed on the host
Kali

Victim

Last updated