Opacity

Room Link: https://tryhackme.com/room/opacity

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found

Kali

TCP/80 - HTTP

Kali

Found this page, I tried different extensions but it looks like it only accepts extentsions that images uses such as .jpg and .png

Initial Shell

Kali

Kali #1

Kali #2

Browser

Get autocomplete

Transfer file

In /opt we find a keepass file so I transfered back to Kali to try to crack it

Kali(receiving)

Victim(sending)

Crack KeePass

Kali

Kali

TCP/22 - SSH

Kali

PSPY

Kali

Victim

The script calls backup.inc.php in the lib folder, we can't edit this file but we can delete it and replace it so I copied the same php reverse shell script that was used before and replaced backup. After that I just waited until the script ran on its own.

Kali #1

Victim

Kali #2

Last updated