Hacker vs. Hacker
Room Link: https://tryhackme.com/room/hackervshacker
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found
Kali
TCP/80 - HTTP
Kali


Kali



Kali
Started using Burp while testing out payloads to url-encode payloads more easy.
Burp


x

I got the password for lachlan but it kept kicking me out
Kali

There is a cronjob running that is killing our shell but can see it is using paths, it first used what is in lachlans bin fodler before /bin and /usr/bin so we can put a reverse shell instead.
Victim(www-data)

Victim(lachlan)
Kali

Last updated