Jack-of-All-Trades
Room Link: https://tryhackme.com/room/jackofalltrades
Initial Scan
For some reason they switched port 22 with http site and 80 with ssh
Kali
nmap -A $VICTIM
Scan all ports
No other ports found
Kali
TCP/22 - HTTP


Had to all the override to see the site on port 22 in firefox




There is a stegosaurus picture on the home page so it is hinting that there's something in one of the pictures, eventually we find jackinthebox username and password in one of the pictures.
Kali




If you run a command like this you can't see the results unless you view the source.
Browser

Kali
Browser

Get autocomplete
In the home directory there is a password list, it's small enough so I copied and pasted into a file on Kali.

Kali

Kali


PSPY
Kali
Victim
Strings as the SUID-bit set which means we can run it against files we normally wouldn't be able to read. I tried getting roots password but it was taking too long.
Victim
Kali
I just ended up using strings to read the root.txt
Kali

Last updated