Pages

Saturday, July 11, 2020

TryHackme:Jack-of-All-Trades

Hi All


This article will be about Jack-of-All-Trades room from TryHackme so let' s play with jack :

I used to start with Nmap scan result :


it seems that we have a web server in port 22 and ssh in port 80 cool after some modification in my navigator i have the first page where i found some information :



For the code is base64 you well get a name and password in the same time i have found another code in the recovery.php page


but their s some other information like johny graves will give us some hint for decoding the next cipher text just look for him in twitter

after using the indication of Mr Johny Graves in found a link to wiki page for stegosaurus dinosaur ok it s an indication to use steganalysis for the picture of the
dinosaur in the home page or another one in the assets folder :


Yes, thank to the creator of this VM i know i m in the right path anyway let s try the samething for jackinthebox pic : nothing found :




Let s try with the header.jpg picture :


OLaaa creds are here finally you have just to cat the file

Go Go motivating myself :)

After authentication in the recovery.php :



When i saw the first time i was thinking to test in command injection (get me a cmd)







Yes now it s easy to have a reverse shell to explore the VM :



i m in the server let s move directly to home folder :


yes some password of jack it s time to bruteforce :)

After using this list in hydra i found the necessary password for ssh access :


in the user folder /home/jack i have found  user.jpg picture :


the picture dowloaded to my machine :



and know i have used the command display user.jpg to the flag :




so let s move to root : sudo -l without any result move to suid file :


After i have noticed that root and jack are in the same group Dev (i used linenum.sh):



so it easy know gtfobin and the flag is found finally :



Yeees Finished IT


Thank you for visiting my blog don't forget to let me a comment.


Kind regards

AbdelMouhine Bouaouda




No comments:

Post a Comment

Offensive Lab : simple Format string challenge

 Hi All  Today i will write about a very easy challenge from Offensive LAB where you can solve it through using reverse engineering techniq...