Year of The Rabbit TryHackMe Writeup

Meliksah Ercan
4 min readJul 13, 2024

--

A writeup for TryHackMe Year of the Rabbit room.

The IP address for target is 10.10.51.145. You should change it to yours.

Nmap

sudo nmap -sS -sV -A 10.10.51.145
namp results

Gobuster

gobuster dir -u 10.10.51.145 -w gobusterDir.txt
gobuster results

Website Inspection

I visited the assets page and found this in style.css:

Well, I visited the link but i got rickrolled :)

Also I watched the rickroll video but there was a voiceover saying you are looking in the wrong place.

Then I opened Burp Suite and inspected the super secret flag link again. Apparently, someone hid this to get request.

There is a picture of a woman. Probably there is something hidden.

Downloaded file and tried a few stuff like exiftool and steghide but they didn’t work. However, strings command did the trick.

strings Hot_Babe.png
strings

FTP

We got our username and password list. I will copy and paste these to a text file and start hydra.

 hydra -l ftpuser -P pass.txt ftp://10.10.51.145 -V

Now we can connect.

There is a file named Eli’s Creds. I will transfer it to our local machine.

get Eli's_Creds.txt

Well, it contains something encryted in Brainf*ck language.

Eli’s Creds

We can go to a random online decoder and get Eli’s user and password.

SSH

I will search for user flag. We can go back in directories and search.

find -name user.txt

Okay, lets look for s3cr3t.

locate s3cr3t

We have the pasford for gwendoline now. We can disconnect and reconnect as gwendoline.

Lets obtain the user flag.

cat user.txt
user flag

Root Flag

We can run vi command. I checked gtfobins but it did not work. Then i checked sudo version and apparently it is vulnerable.

I will CVE:2019–14287 first, since it is one liner.

sudo -u#-1 /usr/bin/vi /home/gwendoline/user.txt

This will open vim. Type :!/bin/bash and enter. Now we are root.

We can go to /root directory and obtain the flag.

--

--

No responses yet