From faece3e88c7e6f117e45563bb72e6538fa9ca25a Mon Sep 17 00:00:00 2001
From: AbdullahRizwan101 <60057481+AbdullahRizwan101@users.noreply.github.com>
Date: Thu, 14 Jan 2021 00:47:34 +0500
Subject: [PATCH] Add files via upload
---
HackMyVM/Helium.md | 54 ++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 54 insertions(+)
create mode 100644 HackMyVM/Helium.md
diff --git a/HackMyVM/Helium.md b/HackMyVM/Helium.md
new file mode 100644
index 0000000..dbfb581
--- /dev/null
+++ b/HackMyVM/Helium.md
@@ -0,0 +1,54 @@
+# HackMyVM-Helium
+
+## NMAP
+
+```
+Host is up (0.00019s latency).
+Not shown: 65533 closed ports
+PORT STATE SERVICE VERSION
+22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
+| ssh-hostkey:
+| 2048 12:f6:55:5f:c6:fa:fb:14:15:ae:4a:2b:38:d8:4a:30 (RSA)
+| 256 b7:ac:87:6d:c4:f9:e3:9a:d4:6e:e0:4f:da:aa:22:20 (ECDSA)
+|_ 256 fe:e8:05:af:23:4d:3a:82:2a:64:9b:f7:35:e4:44:4a (ED25519)
+80/tcp open http nginx 1.14.2
+|_http-server-header: nginx/1.14.2
+|_http-title: RELAX
+MAC Address: 08:00:27:4C:32:E1 (Oracle VirtualBox virtual NIC)
+Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
+
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 8.73 seconds
+```
+
+## PORT 80
+
+
+
+
+
+If we look at the bootstrap css file
+
+
+
+On anaylzing the wav file with audactiy and adding a spectogram we can see a text
+
+
+
+Saying `dancingpassyo`
+
+On trying the password with the username `paul` with ssh
+
+
+
+## Privilege Escalation
+
+We can check what commands can paul run as root so do `sudo -l`
+
+
+
+Seems we can run `ln` as root which is for making symlinks.We can create a binary in which we call `bash` in it and link it with the `/usr/bin/ln` binary
+
+
+
+
\ No newline at end of file