THM:rrootme
THM:RootMe
URL: https://tryhackme.com/room/rrootme [Easy]
Reconnaissance
Description of the room:
Connect to TryHackMe network and deploy the machine. If you don’t know how to do this, complete the OpenVPN room first.
Scanning
Running: nmap
Ran the following:
nmap -sC -sV xxx.xxx.xxx.xxx
Interesting ports found to be open:
PORT STATE SERVICE REASONTBD
Also see: nmap.log
Running: gobuster
Ran the following:
gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -u http://xxx.xxx.xxx.xxx
Interesting folders found:
/TBD (Status: 301) [Size: 0] [--> img/]
Also see: gobuster.log
Gaining Access
Unprivileged Access
TBD
Maintaining Access
TBD
Clearing Tracks
This is a test machine. However, in a Red Team scenario, we could:
Delete relevant logs from /var/log/
- although that might draw attention.
rm -Rf /var/log/*
Search and replace our IP address in all logs via:
find /var/log -name "*" -exec sed -i 's/10.10.2.14/127.0.0.1/g' {}\;
Wipe bash history for any accounts we used via:
cat /dev/null > /root/.bash_history
cat /dev/null > /home/kathy/.bash_history
cat /dev/null > /home/sam/.bash_history
Summary
Completed: [CTRL+SHFT+I]