gitlabEdit

Vulnversity

Learn about active recon, web app attacks and privilege escalation.

Link - https://tryhackme.com/room/vulnversityarrow-up-right

Task 1 - Deploy the machine

Click the start button in the task to start the target machine. It will start and show the machine IP in a minute on the top banner.

Task 2- Reconnaissance

Initial Nmap Scan of the machine

┌──(abhinav㉿ETHICALHACKX)-[~]
└─$ nmap 10.10.157.204
Starting Nmap 7.94 ( https://nmap.org ) at xxxxxx IST
Nmap scan report for 10.10.157.204
Host is up (0.18s latency).
Not shown: 994 closed tcp ports (conn-refused)
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
3128/tcp open  squid-http
3333/tcp open  dec-notes

Nmap done: 1 IP address (1 host up) scanned in 16.04 seconds

Nmap Version Scan

Q. There are many Nmap "cheatsheets" online that you can use too.

Click Question Done.

Q. Scan the box; how many ports are open?

6 - From the default nmap scan above, 6 ports are open

Q. What version of the squid proxy is running on the machine?

3.5.12 - from nmap scan with -sV

Q. How many ports will Nmap scan if the flag -p-400 was used?

400

Q. What is the most likely operating system this machine is running?

Ubuntu - in Service scan check SSH version details

Q. What port is the web server running on?

3333 - Check 'Apache' in nmap scan results

Q. What is the flag for enabling verbose mode using Nmap?

-v , check man page or info or help for nmap, -v for verbose, -V for version, vv for...

Task 3 Locating directories using Gobuster

Running Gobuster with dir mode on target

Q. What is the directory that has an upload form page?

/internal/

Task 4 Compromise the Webserver

Last updated