Tech_Supp0rt: 1
Room Link: https://tryhackme.com/room/techsupp0rt1
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
No other ports found
Kali
TCP/80 - HTTP
gobuster didn't find anything and the home page was just the default ubuntu page. Couldn't find anything of interest.
Kali

TCP/445 - SMB
Kali

I used Cyberchef and it was able to decode the creds

TCP/80 - HTTP


I was able to access the subrion page from panel as mentioned in the message as subrion by itself doesn't work.

Shell
Exploit: https://github.com/h3v0x/CVE-2018-19422-SubrionCMS-RCE
Since it's using Subrion CMS v4.2.1 I looked for exploits and found one for a rce

Victim

The hacker reused the password for both wordpress and ssh.
Kali


Option #1
Just get flag
Privilege Escalation
Kali


Victim

Kali

Last updated