Anonymous

tryhackme.com - © TryHackMe

🔗 Anonymous

Task 1 - Deploy the machine

🎯 Target IP: 10.10.32.229

Create a directory for machine on the Desktop and a directory containing the scans with nmap.

Task 2 - Reconnaissance

I prefer to start recon by pinging the target, this allows us to check connectivity and get OS info.

Sending these three ICMP packets, we see that the Time To Live (TTL) is ~64 secs. this indicates that the target is a *nix system (probably Linux), while Windows systems usually have a TTL of 128 secs.

2.1 - Enumerate the machine. How many ports are open?

command
result

sudo

run as root

sC

run default scripts

sV

enumerate versions

A

aggressive mode

T4

run a bit faster

oN

output to file with nmap formatting

It looks like there are 4 open ports on the machine: 21, 22, 139, 445.

4

2.2 - What service is running on port 21?

FTP

2.3 - What service is running on ports 139 and 445?

SMB

2.4 - There's a share on the user's computer. What's it called?

We can see that the share's name is:

pics

2.5 - Find user flag

Now, we explore others open ports starting with FTP (21):

We see that scripts directory has all permessions, jump in!

Save all them using get command:

Using cat, we can read files:

Focusing on clean.sh file (that have all permissions), we can erase the bucket and put into a reverse shell script (re-uploading it).

We found reverse shell scripts on https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet, and we save it into a new file with duplicate name: clean.sh:

flag is usually in the path: /home

or we can spawn a bash shell

🚩 Flag 1 (flag.txt)

THM{wh0_d035nt_l0ve5_b0l7_r1gh7?}

2.6 - Find root flag

Last updated