gobuster didn't find anything and the home page was just the default ubuntu page. Couldn't find anything of interest.
Kali
TCP/80 - HTTP
I wasn't finding anything so I decided to give the victim IP a hostname based off what I found on the source page.
Kali
Kali
I couldn't enter the scripts folder so I decided to scan it, only one file came up. script.txt
Kali
The script itself isn't useful but there's a message at the bottom that reveals there was an older version of the script with credentials.
I just tried .old instead of .txt and got it
TCP/21 - FTP
Credentials
Kali
I added dev.team.thm to /etc/hosts
LFI
Browser
LFI bruteforce
script.txt
script.sh
Kali
Had to remove the # from each line
Initial Shell
Kali
Lateral Movement
There is a script in gyles home directory that accepts two inputs, the first one doesn't matter but the other we can use to escalate to become the user gyles. Once done it will seem to have frozen but if we get a full TTY shell with python then it works.
Victim
PSPY
Kali
Victim
We can see a script.sh being run under a folder called admin_stuff
Privilege Escalation
The script just calls two other scripts, one of them we can write to.
I added the last line to connect back to my machine.