Startup

Room Link: https://tryhackme.com/room/startuparrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/21 - FTP

Anonymous login is enabled

Kali

TCP/80 - HTTP

Kali

TCP/21 - FTP

Kali

Kali

Kali

Get autocomplete

Netcat

Kali(receiving)

Victim(sending)

Wireshark

Followed the TCP stream and just kept changing it until something came up. Eventually we find lennies password.

Kali

TCP/22 - SSH

Kali

Privilege Escalation

There is a script in lennies directory that is owned by root. We can't make any changes to that script but it calls another script which we do have access to so I add a reverse shell and wait for it to be called.

Kali

Victim

Last updated