Opacity
Room Link: https://tryhackme.com/room/opacity
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found
Kali
TCP/80 - HTTP
Kali

Found this page, I tried different extensions but it looks like it only accepts extentsions that images uses such as .jpg and .png

Initial Shell
Kali

Kali #1
Kali #2
Browser



Get autocomplete
Transfer file
In /opt we find a keepass file so I transfered back to Kali to try to crack it

Kali(receiving)
Victim(sending)
Crack KeePass
Kali

Kali

TCP/22 - SSH
Kali

PSPY
Kali
Victim


The script calls backup.inc.php in the lib folder, we can't edit this file but we can delete it and replace it so I copied the same php reverse shell script that was used before and replaced backup. After that I just waited until the script ran on its own.
Kali #1
Victim
Kali #2

Last updated