# TryHackMe-Hygiene ## NMAP ```bash PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: 37652/tcp open ftp syn-ack ttl 63 ProFTPD 1.3.5e | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-rw-r--r-- 1 1000 1000 118 Oct 29 02:21 memo.txt Service Info: OSs: Linux, Unix; CPE: cpe:/o:lisnux:linux_kernel 8080/tcp open http-proxy | fingerprint-strings: | LDAPBindReq: | HTTP/1.1 400 | Content-Type: text/html;charset=utf-8 | Content-Language: en | Content-Length: 2295 | Date: Thu, 04 Nov 2021 13:02:11 GMT | Connection: close | HTTP Status 400 | Request from the `memo.txt` file we see that a user named `joe` has sent email with the password hash and on cracking the hash we get the password `nightmare` ## PORT 8080 (HTTP) On the webserver there's apache tomcat running if we run `stegcracker` on the png image we can find a easter egg ## Foothold ### Un-inteded We were told to find a username on the page but there wasn't any . All we know is that the username is of 5 characters so let's maybe try to brute force the username with 5 characters We can now then get a shell as `sally` ### Intended Running `gobuster` we can find some directories I tried using default creds on `/manager` , `/host-manager` but wasn't succesful so I did a recusive fuzz on `admin` This returned us `staging` so again running gobuster on this We don't see much here but if we look at the source we can find the username `sally` We can now then get a shell through ssh On doing `sudo -l` we can't do run any thing as root as other user since this user isn't in sudoers file ## Privilege Escalation (Joe) We can the find the user flag in `Desktop` folder of sally and can find another flag in `/home/sally/.local/share/Trash/files` The hash can be cracked with either `hashcat` or `john` but I'll just use cracksation as I did earlier ## Privilege Escalation (root) Running `sudo -l` we can see that this user can run all commands ## References - https://askubuntu.com/questions/911204/how-to-extract-only-7-characters-using-grep