Team

Room Link: https://tryhackme.com/room/teamcwarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found

Kali

TCP/80 - HTTP

gobuster didn't find anything and the home page was just the default ubuntu page. Couldn't find anything of interest.

Kali

TCP/80 - HTTP

I wasn't finding anything so I decided to give the victim IP a hostname based off what I found on the source page.

Kali

Kali

I couldn't enter the scripts folder so I decided to scan it, only one file came up. script.txt

Kali

The script itself isn't useful but there's a message at the bottom that reveals there was an older version of the script with credentials.

I just tried .old instead of .txt and got it

TCP/21 - FTP

Credentials

Kali

I added dev.team.thm to /etc/hosts

LFI

Browser

LFI bruteforce

script.txt

script.sh

Kali

Had to remove the # from each line

Initial Shell

Kali

Lateral Movement

There is a script in gyles home directory that accepts two inputs, the first one doesn't matter but the other we can use to escalate to become the user gyles. Once done it will seem to have frozen but if we get a full TTY shell with python then it works.

Victim

PSPY

Kali

Victim

We can see a script.sh being run under a folder called admin_stuff

Privilege Escalation

The script just calls two other scripts, one of them we can write to.

I added the last line to connect back to my machine.

Kali

Last updated