Umbrella
Room Link: https://tryhackme.com/r/room/umbrella
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/5000 - Docker Registry
List repositories
Kali
Get tags of a repository
Kali

Get manifests
Inside the manifest we find potential credentials
Kali

TCP/3306 - MySQL
Kali
Kali(mysql)

Kali

hash.txt
Kali

output
TCP/22 - SSH
Kali

Privilege Escalation
In Claire's home directory we see the files that host the website. We can see the timeCalc uses the eval statement which is vulnerable.
Victim

TCP/80:443 - HTTP(s)
Kali
Login


Payload


Full TTY Shell

Docker Breakout
Privilege Escalation with 2 shells and host mount
If you have access as root inside a container that has some folder from the host mounted and you have escaped as a non privileged user to the host and have read access over the mounted folder. You can create a bash suid file in the mounted folder inside the container and execute it from the host to privesc.
Victim(root)
Victim(claire-r)

Last updated