Spring
Room Link: https://tryhackme.com/room/spring
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
Kali

TCP/443 - HTTPS
Kali

Kali

Kali

Kali

Changed the wordlist
Kali

GitDumper
Kali

Kali



Initial Shell
Kali #1
Kali #2

reverse.sh
Kali #1
Kali #2
Download payload
Kali #3
Run payload
Kali #3

Get autocomplete
We found one password within environment variables
Victim

Bruteforce su
At this point we have two passwords that are very similar, neither of them are the password for johnsmith to login, the format is PrettyS3cure${keyword}Password123.
su_brute_force.sh
Kali
Victim

Victim

Kali
Victim
Kali
Privilege Escalation
Victim
getroot.sh
Victim

Last updated