filmov
tv
Simple CTF Tryhackme
Показать описание
It is a walkthrough of a room called Simple CTF from Tryhackme.
Steps for pwning this machine:-
1)Start with a map scan (map -A -T4 IP) .
2)Ftp anonymous login was allowed but didn't find anything too important there.
3)Port 80 had a directory called simple which I found through gobuster (gobuster dir -u URL -w /path/to/wordlist/ -x .php,.txt -t 40)
4)A cms was running (cms version 2.2.8)
5)Searchsploit tells us that versions less than 2.2.10 have a sqli vulnerability.
7)If you run into an error while running the exploit i.e errors like no module named termcolor found and pip install termcolor is not working then you have to set a virtual env (apt-get install python3-virtualenv && virtualenv -p python2 venv && . venv/bin/activate)
8)Then you will get the user and pass and login to the machine using ssh which is running on port 2222
9)After logging in, run sudo -l to find what commands the user can run as root without root password (it was /usr/bin/vim)
10) GTFObins tells us we can run this:-(sudo vim -c ':!/bin/sh')
11) we are root !!!!
If you find this video useful then give it a thumbs up and if you want to see more videos like this then subscribe to my channel.
Follow me:-
Steps for pwning this machine:-
1)Start with a map scan (map -A -T4 IP) .
2)Ftp anonymous login was allowed but didn't find anything too important there.
3)Port 80 had a directory called simple which I found through gobuster (gobuster dir -u URL -w /path/to/wordlist/ -x .php,.txt -t 40)
4)A cms was running (cms version 2.2.8)
5)Searchsploit tells us that versions less than 2.2.10 have a sqli vulnerability.
7)If you run into an error while running the exploit i.e errors like no module named termcolor found and pip install termcolor is not working then you have to set a virtual env (apt-get install python3-virtualenv && virtualenv -p python2 venv && . venv/bin/activate)
8)Then you will get the user and pass and login to the machine using ssh which is running on port 2222
9)After logging in, run sudo -l to find what commands the user can run as root without root password (it was /usr/bin/vim)
10) GTFObins tells us we can run this:-(sudo vim -c ':!/bin/sh')
11) we are root !!!!
If you find this video useful then give it a thumbs up and if you want to see more videos like this then subscribe to my channel.
Follow me:-
TryHackMe Simple CTF Official Walkthrough
TryHackMe! Simple CTF
TryHackMe - Simple CTF!
TryHackMe - Simple CTF Walkthrough
[LIVE] Simple CTF - TryHackMe
Simple CTF - TryHackMe (EASY)
tryhackme simple ctf | CyberWorldSec
Backtrack TryhackMe Walkthrough | Medium Room
TryHackMe // Simple CTF (Easy CTF)
CTF (Capture the Flag) - Simple CTF. TryHackMe.
TryHackMe Simple CTF 🏴☠️
🔐SIMPLE CTF 🏴☠️TRYHACKME CTF🐉 WALKTROUGH EN ESPAÑOL 🕵️♀️ OFFENSIVE PENTESTING 🚀...
[CTF] TRYHACKME - SIMPLE CTF (EASY)
Solve Your First CTF! TryHackMe - Simple CTF
Simple CTF (TryHackME)
TryHackMe - Simple CTF
Simple CTF Tryhackme
simple ctf tryhackme
TryHackMe - Simple CTF walkthrough
Do CTFs prepare you to be hacker?
TryHackMe - Simple CTF | Пентест с нуля
Beginner and Easy CTF | TryHackme Wget CTF
Conquering TryHackMe Simple CTF! - TryHackMe Walkthrough
Simple CTF TryHackMe Full Walk-through
Комментарии