TryHackMe – Bounty Hacker
Find open ports on the machine:
Kick off an nmap scan of all ports…
While that is running, lets explore in the browser…
Well, we know port 80 is open. Let’s kick off a scan with dirbuster using a small wordlist:
Poked around on these directories but nothing interesting. nmap results are back:
Open ports: 21, 22, 80
Who wrote the task list?
Not sure what the task list is or where it is but the next question talks about brute forcing a service so I figured I would try brute forcing SSH with hydra using rockyou.txt
Okay…that would take forever. I guess I’ll leave it up in the background while I try something else just in case.
After stumbling around a bit, I decided to check in on ftp but had to look up how to access it:
Viola! We found:
- locks.txt
- task.txt
Site was going really slow, had to shut down hydra to be able to get the files.
wget each file:
task.txt contents:
locks.txt content:
Locks.txt looks like a wordlist we can use to brute force ssh in the next section.
Task.txt also reveals that it was authored by:
lin
What service can you bruteforce with the text file found?
ssh
What is the user’s password?
hydra -l lin -P ./locks.txt 10.10.15.139 -t 4 ssh
Lin’s password is:
RedDr4gonSynd1cat3
User.txt
THM{CR1M3_SyNd1C4T3}
Root.txt
GTFObins shows an exploit for /bin/tar:
Try this out on victim machine:
Works like a charm!
Root.txt:
THM{80UN7Y_h4cK3r}