Zeno
Room Link: https://tryhackme.com/room/zeno
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/12340- HTTP
Kali

Restaurant Management System Exploit
Exploit: https://www.exploit-db.com/raw/47520
The code needed some fixing up
From

To

Kali


Kali
Kali
Browser
Kali
Browser


Get autocomplete
LinPeas
Kali
Victim

MySQL
Victim
Victim(mysql)


Edwards password was still not found

I went back to linpeas and found another password, it's for a different user but it still worked.

TCP/22- SSH
Kali
Victim(edward)

Victim(apache)
Victim(apache)
From

To

Victim(edward)
Kali
Victim(edward)

Last updated