Boxo1troll1

Pavithra Santhosh
4 min readJul 7, 2021

--

Hi folks,

This box is completely for the beginner level challenge

Box url:- https://www.tryhackme.com/room/boxo1troll1

Deploy the machine

Deploy

Check connectivity

Checking connectivity

Enumeration

Run nmap scan to check for open ports

Enumeration

Since, port 80 is open, we will check with the server

There is no useful information, we will run gobuster

Web-server

#gobuster dir — url http://10.10.244.246/ — wordlists /usr/share/wordlists/dirb/common.txt

Go-buster

Check for robots.txt directory

Here, we dont find any information as well.we will run ftp

/robots.txt

Task 1:- Collect Flags

We will login with “anonymous” user for ftp as it does not require passwords

#ftp 10.10.244.246

Here we found a pcap file

Let’s download it to our machine using “get” command

ftp(Anonymous)

We know, that pcap file can be opened using wireshark

Lets open the file using wireshark

We can see the TCP handshake. So, check the stream

Wireshark

By checking all the stream, we got an information about directory

Stream

Lets use this directory in web

We got a roflmao file. Let’s download it

/sup3rs….

Execute the downloaded file using “strings” command

#strings roflmao

Here, we can find the address to proceed

strings

By checking with the address we got 2 files

We will check the files one by one

Dir

By checking “goodluck” directory we got the user

Dir

By checking the password file we get list of passwords

Username
Password list
Password list

Lets store those data in our machine to perform hydra

Username & Password

We are performing hydra to get the credentials for ssh user

hydra

Since, we got the credentials, we will login with ssh

ssh login

We got a user shell

We will check the hostname of the machine

list

Search in google

search engine
Exploit

Start python server and download the file in user

python

Download the file in tmp dir

tmp dir

Compile it to gcc

Compiling

We found the flag!!! yaaay !!!Hope this helped to crack the beginner level challenge box.

Happy Learning!!!

--

--

Pavithra Santhosh
Pavithra Santhosh

Written by Pavithra Santhosh

This is Pavithra Santhosh, who is a aspiring Cyber security professional, Currently part of Red team certification programme from Hacker U.

No responses yet