Mustacchio
Room Link: https://tryhackme.com/room/mustacchio
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
port 8765 found which is running nginx
Kali

TCP/80 - HTTP

There is a users.bak file in the custom folder

It's a bit messy but it appears to be a username and password hash. I put it through crackstation


TCP/8765 - HTTP

Kali


Initial Shell
In the source code there's two interesting places to look


Seems like a waste but we now know the format how to submit something on the site

Input

Input



Kali

Privilege Escalation
We find a program owned by root in joes folder. When we run strings on it we can see tail command is being ran but it is not using full path so we can exploit this.
Victim

Victim

Last updated