Wgel CTF

Room Link: https://tryhackme.com/room/wgelctfarrow-up-right

Scanning

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found.

Kali

TCP/80 - HTTP

On the main page of the site it was just a apache default page but in the source we can see someone named jessie making a comment.

Ran gobuster and found a site under sitemap, nothing really interesting about it when browsing.

Kali

gobuster wasn't really able to find anything interesting.

Kali

Ran dirb with defaults and it found a .ssh folder which has a id_rsa so I downloaded and used it.

Kali

Kali

Victim

I tried cracking jessies hash as I would then be able to run any command with sudo but I couldn't crack it, documenting it anyways.

Victim

Victim

Victim

Instead I changed the passwd file, I first downloaded to kali and changed the line for jessie so their password is now '123'. Then I uploaded it back and just became root.

Victim

Kali

Line to change

Kali

Victim

Last updated