THM | Vulnversity
Basic Computer Exploitation | Vulnversity | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Vulnversity room.
Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.
Task | 1 | Deploy the machine
Question 1: Deploy the machine.
No answer needed
Task | 2 | Reconnaissance
Question 1: There are many Nmap "cheatsheets" online that you can use too.
No answer needed
Question 2: Scan the box; how many ports are open?
6
Question 3: What version of the squid proxy is running on the machine?
3.5.12
Question 4: How many ports will Nmap scan if the flag -p-400
was used?
400
Question 5: What is the most likely operating system this machine is running?
Ubuntu
Question 6: What port is the web server running on?
3333
Question 7: It's essential to ensure you are always doing your reconnaissance thoroughly before progressing. Knowing all open services (which can all be points of exploitation) is very important, don't forget that ports on a higher range might be open, so constantly scan ports after 1000 (even if you leave checking in the background).
No answer needed
Question 8: What is the flag for enabling verbose mode using Nmap?
-v
Task | 3 | Locating directories using Gobuster
Question 1: I have successfully configured Gobuster.
No answer needed
Question 2: What is the directory that has an upload form page?
/internal/
Task | 4 | Compromise the Webserver
Question 1: What common file type you'd want to upload to exploit the server is blocked? Try a couple to find out.
.php
Question 2: I understand the Burpsuite tool and its purpose during pentesting.
No answer needed
Question 3: What extension is allowed after running the above exercise?
.phtml
Question 4: While completing the above exercise, I have successfully downloaded the PHP reverse shell.
No answer needed
Question 5: What is the name of the user who manages the webserver?
bill
Question 6: What is the user flag?
<flag>
Task | 5 | Privilege Escalation
Question 1: On the system, search for all SUID files. Which file stands out?
/bin/systemctl
Question 2: What is the root flag value?
<flag>