HaskHell

Room Link: https://tryhackme.com/room/haskhell

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/5001 - HTTP

Nothing really found, the pages listed are all broken links

Kali

test.hs

Kali

revshell.hs

revshell2.hs

Get autocomplete

Lateral movement

I had access to read user prof's id_rsa key

Victim

Kali

I copied pasted id_rsa into a file on Kali

Privilege Escalation

prof is able to run flask run as root

Kali

Kali

Last updated