Inferno
Room Link: https://tryhackme.com/r/room/inferno
Scans
Initial scan
Kali
nmap -A $VICTIM

Longer scan
Kali



TCP/80 - HTTP
Find Pages
Kali


Hydra
Since we have no information at this point we just try admin as the username
Kali


After some digging we can see this is a codiad ide which has a RCE exploit
Kali #1
Kali #2
Kali #3


Autocomplete
Victim
Lateral Movement
Victim

Victim


TCP/22 - SSH
Kali

Privilege Escalation
Exploit: https://gtfobins.github.io/gtfobins/tee/
Victim

Victim

Last updated