Madeye's Castle

Room Link: https://tryhackme.com/room/madeyescastlearrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/80 - HTTP

Kali

Kali

List

Sent to repeater

Burp

Burp

Burp

Burp

Burp

Kali

Hashes.txt

Burp

users.txt

Ran this to see what kind of hashes they were, they are SHA-512

Kali

Kali

TCP/445 - SMB

TCP/80 - HTTP

Brower

TCP/22 - SSH

Kali

Lateral Movement

Exploit: https://gtfobins.github.io/gtfobins/pico/arrow-up-right

Victim

Kali

Victim(Hermonie)

Kali

Victim(Hermonie)

Transfer File

Kali

Victim(Hermonie)

Ghidra

Kali

Victim(Hermonie)

We know need to figure a way to get to the impressive function. It turns out the random number generator isn't so random, if you keep running it quicky it uses the same number so we can see the answer into quickly enough we'll get to the function.

Victim(Hermonie)

Kali

Victim(Hermonie)

Last updated