πŸ₯½CyberLens

Date: May 18th, 2024, Author: Anthony J. Saab

License

The following post by anthonyjsaab is licensed under CC BY 4.0arrow-up-right

0 - Introduction

Link to room: https://tryhackme.com/r/room/cyberlensp6arrow-up-right

Machine version: CyberLens_v7

This writeup walks you through a room on TryHackMe created by tryhackmearrow-up-right, TeneBrae93arrow-up-right, and tgreenMWRarrow-up-right

1 - Port Scans

1a - Discovery

β”Œβ”€β”€(kaliγ‰Ώkali)-[~]
└─$ sudo nmap -sS -T4 -p- -Pn cyberlens.thm
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-18 20:09 EEST
Nmap scan report for cyberlens.thm (10.10.197.190)
Host is up (0.12s latency).
Not shown: 65519 closed tcp ports (reset)
PORT      STATE SERVICE
80/tcp    open  http
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
5985/tcp  open  wsman
47001/tcp open  winrm
49664/tcp open  unknown
49665/tcp open  unknown
49666/tcp open  unknown
49667/tcp open  unknown
49668/tcp open  unknown
49669/tcp open  unknown
49670/tcp open  unknown
49677/tcp open  unknown
61777/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 335.20 seconds

1b - Versioning

1c - Vulners

It turns out that port 61777 is Apache Tika 1.17:

2 - Foothold using Apache Tika

3 - PrivEsc

3a - Fixing arch mismatch

3b - Enum

#7 seems very promising

3c - PrivEsc

3d - Flag

Last updated