Anonymous

tryhackme.com - © TryHackMe

🔗 Anonymousarrow-up-right

Task 1 - Deploy the machine

🎯 Target IP: 10.10.32.229

Create a directory for machine on the Desktop and a directory containing the scans with nmap.

Task 2 - Reconnaissance

I prefer to start recon by pinging the target, this allows us to check connectivity and get OS info.

Sending these three ICMP packets, we see that the Time To Live (TTL) is ~64 secs. this indicates that the target is a *nix system (probably Linux), while Windows systems usually have a TTL of 128 secs.

2.1 - Enumerate the machine. How many ports are open?

command
result

sudo

run as root

sC

run default scripts

sV

enumerate versions

A

aggressive mode

T4

run a bit faster

oN

output to file with nmap formatting

It looks like there are 4 open ports on the machine: 21, 22, 139, 445.

circle-info

4

2.2 - What service is running on port 21?

circle-info

FTP

2.3 - What service is running on ports 139 and 445?

circle-info

SMB

2.4 - There's a share on the user's computer. What's it called?

We can see that the share's name is:

circle-info

pics

2.5 - Find user flag

Now, we explore others open ports starting with FTP (21):

We see that scripts directory has all permessions, jump in!

Save all them using get command:

Using cat, we can read files:

Focusing on clean.sh file (that have all permissions), we can erase the bucket and put into a reverse shell script (re-uploading it).

We found reverse shell scripts on https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheetarrow-up-right, and we save it into a new file with duplicate name: clean.sh:

flag is usually in the path: /home

or we can spawn a bash shell

chevron-right🚩 Flag 1 (flag.txt)hashtag

THM{wh0_d035nt_l0ve5_b0l7_r1gh7?}

2.6 - Find root flag