Mustacchio

Room Link: https://tryhackme.com/room/mustacchioarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

port 8765 found which is running nginx

Kali

TCP/80 - HTTP

There is a users.bak file in the custom folder

It's a bit messy but it appears to be a username and password hash. I put it through crackstation

TCP/8765 - HTTP

Kali

Initial Shell

In the source code there's two interesting places to look

Seems like a waste but we now know the format how to submit something on the site

Input

Input

Kali

Privilege Escalation

We find a program owned by root in joes folder. When we run strings on it we can see tail command is being ran but it is not using full path so we can exploit this.

Victim

Victim

Last updated