Bounty Hacker - Tryhackme writeup



Tryhackme

Enumeration

nmap -sC -sV -oN nmap/initial $IP


First we list with nmap and we can see that we have 3 open ports, on 21,22,80 we will continue listing.

FTP





We log in as an anonymous user since in the nmap scan we could see that we have allowed ourselves to log in without credentials and we obtain the two txt documents that we find and read.




Here we find the user "lin" which we will use to brute force hydra with the possible passwords that we find in the file "locks.txt".

BruteForce

Now you should bruteforce the password for the user "lin" and you get the password to login into ssh.

User Flag.

We can see the user flag.

Root flag and priesc

For the privilege escalation part we use the binary "tar" that with a "sudo -l" we can see that we can execute it as root without password. We must place the following line in our command terminal: "sudo tar -cf / dev / null / dev / null --checkpoint = 1 --checkpoint-action = exec = / bin / sh"

Enjoy this tutorial and comment here!


By Zer0cool101

Comments here, cracks!

Post a Comment

Comments here, cracks!

Post a Comment (0)

Previous Post Next Post