thm-writeups

Tech_Supp0rt: 1

Topics: Enumeration, Scanning, PrivEsc

Difficulty: Easy


📝 Room Description

This is a room with no specific focus. It covers a little bit of everything. There is also not a set way to do certain things. e.g enumeration is flexible; more than one tool can be used and there are multiple approaches.


🔎 Enumeration

Nmap

nmap

SMB

smb1

smb2

enter

Gobuster/ffuf

web

curl

ffuf

robots

panel

Subrion

cc

Exploitation

db

shell

PrivEsc

wordpress

-By reading the file we see a password which might possibly be for ssh and the scamsite user.

ssh

sshlogin

sudol

gtfo

root


Afterthoughts


Questions or Issues