Jack-of-All-Trades

Room Link: https://tryhackme.com/room/jackofalltradesarrow-up-right

Initial Scan

For some reason they switched port 22 with http site and 80 with ssh

Kali

nmap -A $VICTIM

Scan all ports

No other ports found

Kali

TCP/22 - HTTP

Had to all the override to see the site on port 22 in firefox

There is a stegosaurus picture on the home page so it is hinting that there's something in one of the pictures, eventually we find jackinthebox username and password in one of the pictures.

Kali

If you run a command like this you can't see the results unless you view the source.

Browser

Kali

Browser

Get autocomplete

In the home directory there is a password list, it's small enough so I copied and pasted into a file on Kali.

Kali

Kali

PSPY

Kali

Victim

Strings as the SUID-bit set which means we can run it against files we normally wouldn't be able to read. I tried getting roots password but it was taking too long.

Victim

Kali

I just ended up using strings to read the root.txt

Kali

Last updated