TryHackMe - Tomghost
Nmap
Port 8080
We can not access Server Status, manager app and host manager (access denied)
Port 8009
This port was unexpected. When looking up online there is a reference to CVE-2020-1938 aka Ghostcat so with the name of the room this is a big hint that we need to use it.
As usual hacktricks have a great resource about it here
Let's get the exploit mentioned in the article and try it out
It is specify that we need to launch it like this
usage: 48143 [-h] [-p PORT] [-f FILE] target
In the home of our initial user there are 2 interesting files that are worth checking
tryhackme.asc
andcredential.pgp
We take them in our kali using ftp in our kali we type
python3 -m pyftpdlib -p 21 --write
From our target we connect to our kali with ftp and put both files
Lateral movement
Using the password found we can now read the pgp file
Privesc
Let's checkout gtfobins
Last updated