Skip to content

Commit d02aacc

Browse files
Formatted the document properly
1 parent 84ce3a0 commit d02aacc

File tree

1 file changed

+81
-81
lines changed

1 file changed

+81
-81
lines changed

_posts/2022-07-23-writeup-thm-pickle-rick.md

Lines changed: 81 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -13,100 +13,100 @@ sitemap:
1313
---
1414

1515

16-
>Link to the room : https://tryhackme.com/room/picklerick
16+
Link to the room : https://tryhackme.com/room/picklerick
1717

1818

19-
>This is the http page for the machine! :-
20-
>
21-
>![Screenshot 2022-07-22 182409](https://user-images.githubusercontent.com/90099173/180499936-2372d5fc-ef6a-46de-ac80-d20534d0e817.png)
22-
>
19+
This is the http page for the machine! :-
20+
21+
![Screenshot 2022-07-22 182409](https://user-images.githubusercontent.com/90099173/180499936-2372d5fc-ef6a-46de-ac80-d20534d0e817.png)
22+
2323

24-
>Lets run a nmap scan to know more!
25-
>
26-
>![Screenshot 2022-07-22 183931](https://user-images.githubusercontent.com/90099173/180499956-49eeb725-6694-4ac5-aa6c-ddb5ce21410b.png)
24+
Lets run a nmap scan to know more!
25+
26+
![Screenshot 2022-07-22 183931](https://user-images.githubusercontent.com/90099173/180499956-49eeb725-6694-4ac5-aa6c-ddb5ce21410b.png)
2727

2828

2929

30-
>As only 2 ports are open lets try to find more directories!
31-
>
32-
>![Screenshot 2022-07-22 193213](https://user-images.githubusercontent.com/90099173/180499961-ef167237-365d-4d7d-bc15-49a37ff90a01.png)
33-
>
34-
>robots.txt seems interesting, Lets check it out!
30+
As only 2 ports are open lets try to find more directories!
31+
32+
![Screenshot 2022-07-22 193213](https://user-images.githubusercontent.com/90099173/180499961-ef167237-365d-4d7d-bc15-49a37ff90a01.png)
33+
34+
robots.txt seems interesting, Lets check it out!
3535

3636

37-
>Let me check the source code of the page first, to see if i get anything potential!
38-
>![Screenshot 2022-07-22 193625](https://user-images.githubusercontent.com/90099173/180499966-3775da4b-15db-4c66-a209-4ba505daf9a0.png)
39-
>
40-
>I got the username!
37+
Let me check the source code of the page first, to see if i get anything potential!
38+
![Screenshot 2022-07-22 193625](https://user-images.githubusercontent.com/90099173/180499966-3775da4b-15db-4c66-a209-4ba505daf9a0.png)
39+
40+
I got the username!
4141

42-
>Now lets check the robots.txt.
43-
>![Screenshot 2022-07-22 193755](https://user-images.githubusercontent.com/90099173/180499970-cec67544-0974-48ea-8860-f683bec49f45.png)
44-
>
45-
>Seems interesting
42+
Now lets check the robots.txt.
43+
![Screenshot 2022-07-22 193755](https://user-images.githubusercontent.com/90099173/180499970-cec67544-0974-48ea-8860-f683bec49f45.png)
44+
45+
Seems interesting
4646

4747

48-
>Lets try to ssh using the username and the string we got in the robots.txt
49-
>![Screenshot 2022-07-22 195510](https://user-images.githubusercontent.com/90099173/180499975-317d980a-d1e0-4874-8b46-3ca188b22d51.png)
50-
>
51-
>ok
48+
Lets try to ssh using the username and the string we got in the robots.txt
49+
![Screenshot 2022-07-22 195510](https://user-images.githubusercontent.com/90099173/180499975-317d980a-d1e0-4874-8b46-3ca188b22d51.png)
50+
51+
ok
5252

5353

5454

55-
>Why not find login panels in the web?, Lets do it.
56-
>
57-
>![Screenshot 2022-07-22 202929](https://user-images.githubusercontent.com/90099173/180499980-c0419c5e-9a7a-45f8-9961-2fed28e5e9de.png)
58-
>
59-
>Great so we got an login panel
60-
>
61-
>![Screenshot 2022-07-22 231432](https://user-images.githubusercontent.com/90099173/180499987-0d1fdcc2-2fe4-458f-a546-403e5947a5d2.png)
55+
Why not find login panels in the web?, Lets do it.
56+
57+
![Screenshot 2022-07-22 202929](https://user-images.githubusercontent.com/90099173/180499980-c0419c5e-9a7a-45f8-9961-2fed28e5e9de.png)
58+
59+
Great so we got an login panel
60+
61+
![Screenshot 2022-07-22 231432](https://user-images.githubusercontent.com/90099173/180499987-0d1fdcc2-2fe4-458f-a546-403e5947a5d2.png)
6262

63-
>Lets use the credentials we got earlier!
64-
>![Screenshot 2022-07-22 231525](https://user-images.githubusercontent.com/90099173/180499990-a66c2b86-21a5-4733-b4a9-af18142e4420.png)
65-
>
66-
>Great so now we have command line interface lol.
67-
>![Screenshot 2022-07-22 231602](https://user-images.githubusercontent.com/90099173/180499992-fcbed99f-cbeb-49a3-8361-d592674f1582.png)
68-
>
69-
>Lets ls quickly!
63+
Lets use the credentials we got earlier!
64+
![Screenshot 2022-07-22 231525](https://user-images.githubusercontent.com/90099173/180499990-a66c2b86-21a5-4733-b4a9-af18142e4420.png)
65+
66+
Great so now we have command line interface lol.
67+
![Screenshot 2022-07-22 231602](https://user-images.githubusercontent.com/90099173/180499992-fcbed99f-cbeb-49a3-8361-d592674f1582.png)
68+
69+
Lets ls quickly!
7070
![Screenshot 2022-07-22 231906](https://user-images.githubusercontent.com/90099173/180499995-b94f9a8b-99af-4d52-aa1b-f0c9ca7a023b.png)
71-
>Woah!, lets try to access it via browser as its in the same directory!
72-
>
73-
>![Screenshot 2022-07-22 232114](https://user-images.githubusercontent.com/90099173/180500001-f39ba826-ef86-4225-8446-bac36c824ba3.png)
74-
>![Screenshot 2022-07-22 232204](https://user-images.githubusercontent.com/90099173/180500005-fc34560f-b6af-4b77-bde3-0a23b7ab16e8.png)
75-
>Great!
76-
>
77-
>Lets check clue.txt now.
78-
79-
>![Screenshot 2022-07-22 232349](https://user-images.githubusercontent.com/90099173/180500011-973f0cf7-88e4-4fb6-a2dc-8f353ed27b0a.png)
80-
>
81-
>Ok so basically we'll need a shell in order to navigate through filesystem effeciently!
82-
>
83-
>We have a good resource for shells : gtfobins.github.io
84-
>
85-
>![Screenshot 2022-07-22 233105](https://user-images.githubusercontent.com/90099173/180500016-777f3b7e-55fa-4c5d-b37f-dfca22c1b7f8.png)
86-
87-
88-
>I just modified it little bit, to make it short and easy!
89-
>First run the netcat listener to start listening for the reverse shell in the attacker machine!
90-
>
91-
>![Screenshot 2022-07-22 233347](https://user-images.githubusercontent.com/90099173/180500025-20b5296a-eb39-4dfe-9251-5e179c17ea00.png)
92-
93-
94-
>Now run the payload in the command pannel.
95-
>
96-
>![Screenshot 2022-07-22 233527](https://user-images.githubusercontent.com/90099173/180500029-0fd0293c-d576-4857-a21d-17f4c0212a07.png)
97-
>
98-
99-
>Great, so now we have a reverse shell!
100-
>
101-
>![Screenshot 2022-07-22 233558](https://user-images.githubusercontent.com/90099173/180500031-a0a56e58-2cb3-40c9-ba12-5dd20d8a41e8.png)
102-
103-
104-
>Lets check for users in the home directory!
105-
>![Screenshot 2022-07-22 233811](https://user-images.githubusercontent.com/90099173/180500034-e8184b6a-71e7-492c-bd1f-061c9986a271.png)
106-
>
107-
>Greaat we got our second ingredient!
108-
109-
>Lets try to sudo su to see if we get root acces?
110-
>![Screenshot 2022-07-22 234021](https://user-images.githubusercontent.com/90099173/180500036-97215b6a-210d-4ad2-a4f2-e90f89d66a8b.png)
111-
>
112-
>Great we got the root acces and also the third ingredient!
71+
Woah!, lets try to access it via browser as its in the same directory!
72+
73+
![Screenshot 2022-07-22 232114](https://user-images.githubusercontent.com/90099173/180500001-f39ba826-ef86-4225-8446-bac36c824ba3.png)
74+
![Screenshot 2022-07-22 232204](https://user-images.githubusercontent.com/90099173/180500005-fc34560f-b6af-4b77-bde3-0a23b7ab16e8.png)
75+
Great!
76+
77+
Lets check clue.txt now.
78+
79+
![Screenshot 2022-07-22 232349](https://user-images.githubusercontent.com/90099173/180500011-973f0cf7-88e4-4fb6-a2dc-8f353ed27b0a.png)
80+
81+
Ok so basically we'll need a shell in order to navigate through filesystem effeciently!
82+
83+
We have a good resource for shells : gtfobins.github.io
84+
85+
![Screenshot 2022-07-22 233105](https://user-images.githubusercontent.com/90099173/180500016-777f3b7e-55fa-4c5d-b37f-dfca22c1b7f8.png)
86+
87+
88+
I just modified it little bit, to make it short and easy!
89+
First run the netcat listener to start listening for the reverse shell in the attacker machine!
90+
91+
![Screenshot 2022-07-22 233347](https://user-images.githubusercontent.com/90099173/180500025-20b5296a-eb39-4dfe-9251-5e179c17ea00.png)
92+
93+
94+
Now run the payload in the command pannel.
95+
96+
![Screenshot 2022-07-22 233527](https://user-images.githubusercontent.com/90099173/180500029-0fd0293c-d576-4857-a21d-17f4c0212a07.png)
97+
98+
99+
Great, so now we have a reverse shell!
100+
101+
![Screenshot 2022-07-22 233558](https://user-images.githubusercontent.com/90099173/180500031-a0a56e58-2cb3-40c9-ba12-5dd20d8a41e8.png)
102+
103+
104+
Lets check for users in the home directory!
105+
![Screenshot 2022-07-22 233811](https://user-images.githubusercontent.com/90099173/180500034-e8184b6a-71e7-492c-bd1f-061c9986a271.png)
106+
107+
Greaat we got our second ingredient!
108+
109+
Lets try to sudo su to see if we get root acces?
110+
![Screenshot 2022-07-22 234021](https://user-images.githubusercontent.com/90099173/180500036-97215b6a-210d-4ad2-a4f2-e90f89d66a8b.png)
111+
112+
Great we got the root acces and also the third ingredient!

0 commit comments

Comments
 (0)