Library

Room Link: https://tryhackme.com/room/bsidesgtlibraryarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found

Kali

TCP/80 - HTTP

Kali

Nothing in the robots.txt except a hint to use rockyou

We can see a potential username

TCP/22 - SSH

Since I couldn't find anything on the webpage I tried bruteforcing ssh with the name we had and rockyou.txt for passwords

Kali

Kali

Victim

We can run a python script with NOPASSWD. After looking at the script nothing stood out that could be exploited as is but I did have access to delete the script and put my own.

Victim

Victim

Last updated