TryHackMe - Internal
Internal
internal
Enumeration
1 | ➜ tmp rustscan -a 10.10.103.231 |
WordPress Scanning
1 | wscan --url http://10.10.103.231/blog --usernames admin --passwords rockyou.txt |
Exploitation
- Found credentials in a private post:
william:arnold147. - Uploaded PHP reverse shell via WordPress theme editor (404.php).
- Found Aubreanna's credentials in
/opt/wp-save.txt:aubreanna:bubb13guM!@#123.
Post-Exploitation
Jenkins Access
Found jenkins.txt indicating a service on
172.17.0.2:8080.
1 | ssh -L 9999:172.17.0.2:8080 aubreanna@internal.thm |
Brute-forced Jenkins login: - admin:spongebob
Root Access
Executed Groovy script in Jenkins script console to get a reverse
shell. Found root credentials in /opt/note.txt: -
root:tr0ub13guM!@#123
1 | ssh root@internal.thm |