Tech_Supp0rt: 1

Room Link: https://tryhackme.com/room/techsupp0rt1arrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found

Kali

TCP/80 - HTTP

gobuster didn't find anything and the home page was just the default ubuntu page. Couldn't find anything of interest.

Kali

TCP/445 - SMB

Kali

I used Cyberchef and it was able to decode the creds

TCP/80 - HTTP

I was able to access the subrion page from panel as mentioned in the message as subrion by itself doesn't work.

Shell

Exploit: https://github.com/h3v0x/CVE-2018-19422-SubrionCMS-RCEarrow-up-right

Since it's using Subrion CMS v4.2.1 I looked for exploits and found one for a rce

Victim

The hacker reused the password for both wordpress and ssh.

Kali

Option #1

Just get flag

Privilege Escalation

Kali

Victim

Kali

Last updated