Startup

tryhackme.com - Β© TryHackMe

Intro

Room Info

πŸ”— Name

🎯 Target IP

10.10.173.77

πŸ“ˆ Difficulty level

🟒Easy

πŸ’² Subscription type

Free

🐧 OS

Linux


Recon

Start Reconnaissance

Enumerate Web server directories

Navigate to

  • http://startup.thm/files/

Login via FTP with anonymous:anonymous. The files in the folder are the ones from the /files webpage.


Exploitation

Get a Reverse shell by uploading a PHP file via FTP and run it through the web page.

  • Navigate to http://startup.thm/files/ftp/shell.php to get a reverse shell

Transfer suspicious.pcapng using netcat

Analyze the susp.pcap file in Wireshark or use the strings command

Try the string as password for lennie user.

πŸ“Œ lennie:c4ntg3t3n0ughsp1c3

  • 🚩 Get user.txt

Close the reverse shell and connect via SSH

Perform some Enumeration with lennie user


Privilege Escalation

Since planner.sh will be run as root (with a cron job), and it contains the /etc/print.sh command script, modify /etc/print.sh and input a payload (a reverse shell for example) into it to run it as root.

Wait for the reverse shell on the attacker machine. The root will run the planner.sh script once a minute.


Last updated

Was this helpful?