U.A. High School TryHackMe Walkthrough | Easy

Описание к видео U.A. High School TryHackMe Walkthrough | Easy

In this video, we are gonna be solving tryhackme's new easy ctf challenge u.a high school [ https://tryhackme.com/r/room/yueiua ] based on the anime my hero academia. We just begin with a basic nmap with having just two ports open one's ssh and on port 80 we got a High School website hosted using apache2, we fuzz directories using gobuster and dirsearch and ended up on an endpoint that gives us rce on the box, we could've found that parameter using a tool like arjun, but here dirsearch did the job for us too. After getting a shell as www-data user, we found a jpg image file which has deku user creds hidden, we first transfer that jpg over to our box, fix the magic bytes for jpg file, and extract the credentials using steghide / stegseek. Login as deku on the box, we found we can run a feedback.sh script with sudo perms and feedback.sh accepts user input and run it with eval, we cat the root flag by specifying the command in /etc/crontab file. Hope you learned something new 🙏🚀❤️

Medium blog post for dirsearch - [   / a-story-of-default-wordlist-in-dirsearch-t...   ]

Follow me on social media:
●   / hoodietramp  
●   / hoodietramp  

Blog:
● https://blog.h00dy.me

Github:
● https://github.com/hoodietramp

Mastodon:
● https://mastodon.social/@h00dy
● https://defcon.social/@h00dy
● https://infosec.exchange/@h00dy

Join 345y🛸:
●   / discord  

Support This Tramp!
Donations are not required but are greatly appreciated!
💸BuyMeACoffee: https://buymeacoffee.com/h00dy

#tryhackme #ctf #boot2root #redteam #walkthrough #pentesting

Комментарии

Информация по комментариям в разработке