Madeye's Castle
Room Link: https://tryhackme.com/room/madeyescastle
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
Kali
TCP/80 - HTTP
Kali


Kali



List


Sent to repeater
Burp

Burp

Burp

Burp

Burp

Kali

Hashes.txt
Burp

users.txt



Ran this to see what kind of hashes they were, they are SHA-512
Kali

Kali

TCP/445 - SMB


TCP/80 - HTTP
Brower


TCP/22 - SSH
Kali

Lateral Movement
Exploit: https://gtfobins.github.io/gtfobins/pico/
Victim


Kali

Victim(Hermonie)
Kali
Victim(Hermonie)

Transfer File
Kali
Victim(Hermonie)
Ghidra
Kali

Victim(Hermonie)
We know need to figure a way to get to the impressive function. It turns out the random number generator isn't so random, if you keep running it quicky it uses the same number so we can see the answer into quickly enough we'll get to the function.
Victim(Hermonie)

Kali
Victim(Hermonie)

Last updated