UltraTech

Room Link: https://tryhackme.com/room/ultratech1arrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

Kali

TCP/8081 - HTTP

Kali

TCP/31331 - HTTP

Kali

Command Injection Payload: https://github.com/payloadbox/command-injection-payload-listarrow-up-right

We can see two intresting users in passwd file

TCP/22 - SSH

Kali

Privilege Escalation

Exploit: https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalationarrow-up-right

We can see our user is in the docker group so we were able to break out and become a regular user.

Victim

Victim

Victim

Victim

Last updated