Startup

Intro
Room Info

π Name
π― Target IP
10.10.173.77
π Difficulty level
π’Easy
π² Subscription type
Free
π§ OS
Linux
Recon
Start Reconnaissance
Enumerate Web server directories
Navigate to
http://startup.thm/files/

Login via FTP with anonymous:anonymous. The files in the folder are the ones from the /files webpage.

Exploitation
Get a Reverse shell by uploading a PHP file via FTP and run it through the web page.
Navigate to
http://startup.thm/files/ftp/shell.phpto get a reverse shell


Transfer suspicious.pcapng using netcat
Analyze the susp.pcap file in Wireshark or use the strings command

Try the string as password for lennie user.
π
lennie:c4ntg3t3n0ughsp1c3
π© Get
user.txt
Close the reverse shell and connect via SSH
Perform some Enumeration with lennie user

Privilege Escalation
Since planner.sh will be run as root (with a cron job), and it contains the /etc/print.sh command script, modify /etc/print.sh and input a payload (a reverse shell for example) into it to run it as root.
Wait for the reverse shell on the attacker machine. The root will run the planner.sh script once a minute.

Last updated
Was this helpful?