Peak Hill

Room Link: https://tryhackme.com/room/peakhill

Scans

Initial scan

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/21 - FTP

Kali

There was just one file with no info.

Kali(ftp)

Decrypt Program

read.py

Kali

output.txt

Kali

Username

Kali

Password

TCP/22 - SSH

Kali

There is a pyc file in the home directory. .pyc are automatically generated by the interpreter when you import a module, which speeds up future importing of that module. These files are therefore only created from a .py file if it is imported by another .py file or module. We can use the uncompyle6 (A native Python cross-version decompiler and fragment decompiler to get the original python file.

Victim

Transfer file then decompile it

Kali

Kali

We can see some interesting things from the file. A username and password and something runnining on port 7321 which also came up on our scans.

Took a piece of the code to get the username and password.

output.py

Kali

TCP/7321 - Script

Kali

Kali

Kali

Kali

Victim

Victim

serial.py

Kali

Victim

Last updated