Zeno

Room Link: https://tryhackme.com/room/zeno

Scans

Initial scan

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/12340- HTTP

Kali

Restaurant Management System Exploit

Exploit: https://www.exploit-db.com/raw/47520

The code needed some fixing up

From

To

Kali

Kali

Kali

Browser

Kali

Browser

Get autocomplete

LinPeas

Kali

Victim

MySQL

Victim

Victim(mysql)

Edwards password was still not found

I went back to linpeas and found another password, it's for a different user but it still worked.

TCP/22- SSH

Kali

Victim(edward)

Victim(apache)

Victim(apache)

From

To

Victim(edward)

Kali

Victim(edward)

Last updated