Vulnversity- TryHackMe lab
Today I am working on the Vulnversity challenge from tryhackme.com

I start with an nmap scan with the service version flag against the host: nmap -sV hostipaddress

TryHackMe had a great nmap reference table so I pasted it below:

I found a web server on port 3333 and started to look into it

I then used the tool gobuster to check for pages on the web server


Cheching the internal page, I found an upload form

Now I can upload a reverse shell


The form did not allow .php file types, I used Burp Suite to attempt different file types, .phtml worked so I just renamed the file.

I started a netcat listener on my attack machine to connect to the reverse shell

I uploaded the file and connected to a shell

I now have a shell on the webserver, next I need to escalate privileges
0 Comments