Wgel CTF
Room Link: https://tryhackme.com/room/wgelctf
Scanning
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
No other ports found.
Kali
TCP/80 - HTTP
On the main page of the site it was just a apache default page but in the source we can see someone named jessie making a comment.

Ran gobuster and found a site under sitemap, nothing really interesting about it when browsing.
Kali

gobuster wasn't really able to find anything interesting.
Kali

Ran dirb with defaults and it found a .ssh folder which has a id_rsa so I downloaded and used it.
Kali


Kali

Victim

I tried cracking jessies hash as I would then be able to run any command with sudo but I couldn't crack it, documenting it anyways.
Victim
Victim
Victim
Instead I changed the passwd file, I first downloaded to kali and changed the line for jessie so their password is now '123'. Then I uploaded it back and just became root.
Victim
Kali
Line to change

Kali
Victim

Last updated