Brooklyn Nine Nine

tryhackme.com - © TryHackMe

Task 1 - Deploy the machine

🎯 Target IP: 10.10.218.233

Create a directory for machine on the Desktop and a directory containing the scans with nmap.

Task 2 - Reconnaissance

I prefer to start recon by pinging the target, this allows us to check connectivity and get OS info.

Sending these three ICMP packets, we see that the Time To Live (TTL) is ~64 secs. this indicates that the target is a *nix system (probably Linux), while Windows systems usually have a TTL of 128 secs.

Task 2 - Find the User flag

We found a good info: ftp-anon: Anonymous FTP login allowed (FTP code 230), but first we check the port 80.

inspecting source code we found this message:

After this, we try to access with ftp

We can use anonymous login (without psw)

In the current directory there's a file: note_to_jake.txt, we get it to read it.

it's another great indication, we know that there's a user: Jake with a weak password.

We use brute force tool: Hydra with parameters: Jake and dictionary (rockyou).

jake::987654321

We can use the credentials obtained for ssh access:

🚩 Flag 1 (user.txt)

ee11cbb19052e40b07aac0ca060c23ee

Task 3 - Find the Root flag

Now, we need to get root permissions to explore the root folder.

We can use the following command to list SUID files or sudo -l command:

/bin/less stands out, We can use script of this website to became a root, in this case we choose less process: https://gtfobins.github.io/gtfobins/less/

Now, we're root!

🚩 Flag 2 (root.txt)

63a9f0ea7bb98050796b649e85481845

Last updated