Peak Hill
Room Link: https://tryhackme.com/room/peakhill
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/21 - FTP
Kali
There was just one file with no info.
Kali(ftp)




Decrypt Program
read.py
Kali

output.txt
Kali

Username
Kali

Password
TCP/22 - SSH
Kali

There is a pyc file in the home directory. .pyc are automatically generated by the interpreter when you import a module, which speeds up future importing of that module. These files are therefore only created from a .py file if it is imported by another .py file or module. We can use the uncompyle6 (A native Python cross-version decompiler and fragment decompiler to get the original python file.
Victim


Transfer file then decompile it
Kali
Kali
We can see some interesting things from the file. A username and password and something runnining on port 7321 which also came up on our scans.


Took a piece of the code to get the username and password.
output.py
Kali

TCP/7321 - Script
Kali

Kali


Kali
Kali

Victim

Victim

serial.py
Kali

Victim

Last updated