Spring

Room Link: https://tryhackme.com/room/spring

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/443 - HTTPS

Kali

Kali

Kali

Kali

Changed the wordlist

Kali

GitDumper

Kali

Kali

Initial Shell

Exploit: https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database/

Kali #1

Kali #2

reverse.sh

Kali #1

Kali #2

Download payload

Kali #3

Run payload

Kali #3

Get autocomplete

We found one password within environment variables

Victim

Bruteforce su

At this point we have two passwords that are very similar, neither of them are the password for johnsmith to login, the format is PrettyS3cure${keyword}Password123.

su_brute_force.sh

Kali

Victim

Victim

Kali

Victim

Kali

Privilege Escalation

Victim

getroot.sh

Victim

Last updated