Search This Blog
Welcome to my blog! I'm Adi, a passionate cybersecurity enthusiast dedicated to helping others navigate the complex world of cybersecurity. I write in-depth technical blogs, review essential cybersecurity books, and provide valuable insights and resources for both beginners and professionals. My goal is to empower individuals to enhance their skills, stay updated on the latest trends, and succeed in their cybersecurity careers. Whether you're just starting out or looking to deepen your knowledge
Featured
- Get link
- X
- Other Apps
Year of the rabbit walkthrough on tryhackme
The "Year of the Rabbit" room on TryHackMe is designed to introduce users to the basics of web application security through a series of tasks and challenges. In this room, participants will explore common vulnerabilities and learn fundamental techniques for identifying and exploiting them.
The room typically includes:
- Introduction to Web Security: A brief overview of web application security concepts.
- Vulnerability Identification: Exercises focusing on finding vulnerabilities in a web application.
- Exploitation Techniques: Practical tasks demonstrating how to exploit discovered vulnerabilities.
- Mitigation Strategies: Recommendations for fixing the vulnerabilities and improving web application security.
It's a hands-on learning experience aimed at beginners, providing foundational knowledge and practical skills in web application security.
Let's start solving this room
1.)First deploy the machine and connect to vpn
2.) Lets run rustscan which ports are open
3.) Okay, now we know that 21-ftp, 22-ssh and 80-http port is open
examine the website
4.) Let's bruteforce the directories of the website with gobuster
We found /assets directory
lets examine
Download style.css file using this command: wget <ip>/assets/style.css
5.) use cat command to see what's inside style.css
we got one more directory of the website
Let's launch the burpsuite and visit the website
In burpsuite we can see that we got another hidden directory let's visit that directory
Download the Hot_babe.png with the wget and use cat to see everything what's inside
congratulation we got the username and bunch of passwords (save the passwords in txt file) now we can bruteforce the ftp port with the hydra
6.) Hydra
7.) login into the ftp port using these credentials
Download the Eli's_creds.txt file we found on the ftp server
8.) using cat command see what's inside in the Eli's_creds.txt
Okay let's ask to chatgpt to analyze the hash
It's brainfuck algorithm Now we can decrypt
Congratulation we got the username and password of the ssh server
9.) Connect to the ssh server
then use this command: find / -name "s3cr3t" 2>>/dev/null
then ls -al
see we got the hidden file cat thehidden file
Let's go we got the password Gwendoline now use this command: su gwendoline
Congratulation we got first flag user.txt
10.) Privilege Escalation
use these commands
- sudo -u#-1 /usr/bin/vi /home/gwendoline/user.txt
- :!/bin/bash
- Get link
- X
- Other Apps
Popular Posts
Top Cybersecurity Discord Servers You Should Join
- Get link
- X
- Other Apps
Intermediate Level Hacking Books: A Comprehensive Guide
- Get link
- X
- Other Apps
Comments
Post a Comment