Date: 10, December, 2020
Author: Dhilip Sanjay S
Click Here to go to the TryHackMe room.
- Answer: 4
- Steps to Reproduce:
nmap <MACHINE_IP>
- Answer: FTP
- Answer: SMB
- Answer: pics
- Steps to Reproduce:
enum4linux -S <MACHINE_IP>
- Steps:
- Place the code for reverse shell in script file
clean.sh
. - Listen for incoming connections using
netcat
.
- Place the code for reverse shell in script file
- Steps to Previlege Escalation:
- Abusing SUID for Linux Previlege Escalation.
- Once you have the reverse shell, SUID3NUM script can be used to find the vulnerabilities.