Startup
Room Link: https://tryhackme.com/room/startup
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
Kali

TCP/21 - FTP
Anonymous login is enabled
Kali

TCP/80 - HTTP
Kali

TCP/21 - FTP
Kali

Kali
Kali


Get autocomplete
Netcat
Kali(receiving)
Victim(sending)
Wireshark
Followed the TCP stream and just kept changing it until something came up. Eventually we find lennies password.
Kali

TCP/22 - SSH
Kali


Privilege Escalation
There is a script in lennies directory that is owned by root. We can't make any changes to that script but it calls another script which we do have access to so I add a reverse shell and wait for it to be called.
Kali
Victim


Last updated