Team
Room Link: https://tryhackme.com/room/teamcw
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found
Kali
TCP/80 - HTTP
gobuster didn't find anything and the home page was just the default ubuntu page. Couldn't find anything of interest.
Kali



TCP/80 - HTTP
I wasn't finding anything so I decided to give the victim IP a hostname based off what I found on the source page.
Kali
Kali



I couldn't enter the scripts folder so I decided to scan it, only one file came up. script.txt
Kali


The script itself isn't useful but there's a message at the bottom that reveals there was an older version of the script with credentials.

I just tried .old instead of .txt and got it


TCP/21 - FTP
Credentials
Kali


I added dev.team.thm to /etc/hosts



LFI
Browser

LFI bruteforce
script.txt
script.sh
Kali
Had to remove the # from each line

Initial Shell
Kali

Lateral Movement
There is a script in gyles home directory that accepts two inputs, the first one doesn't matter but the other we can use to escalate to become the user gyles. Once done it will seem to have frozen but if we get a full TTY shell with python then it works.
Victim

PSPY
Kali
Victim
We can see a script.sh being run under a folder called admin_stuff

Privilege Escalation
The script just calls two other scripts, one of them we can write to.

I added the last line to connect back to my machine.

Kali

Last updated