Feb. 11, 2024, 2:01 p.m. | 0xViKi

System Weakness - Medium systemweakness.com

Tech Support :Hack into the scammer’s under-development website to foil their plans. (THM-ROOM)

Room Overview:

Reconnaissance:

A meticulous Nmap scan and subsequent Gobuster directory enumeration laid the groundwork. Notable findings included SSH, Apache, and Samba services. Gobuster unearthed intriguing directories, such as “/wordpress” and “/test.”

Nmap Scan result

Nmap Scan Results:

  • Port 22/tcp: OpenSSH 7.2p2 Ubuntu 4ubuntu2.10
  • Port 80/tcp: Apache httpd 2.4.18 (Ubuntu)
  • Port 139/tcp: Samba smbd 3.X — …

apache development directory directory enumeration enumeration file file upload findings foil gobuster hack link nmap plans rce room samba scammer scan services ssh sudo support tech tech support thm thm-writeup under upload website

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Salesforce Solution Consultant

@ BeyondTrust | Remote United States

Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit

@ City of Philadelphia | Philadelphia, PA, United States

Security Engineer, IT IAM, EIS

@ Micron Technology | Hyderabad - Skyview, India

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

Werkstudent Cybersecurity (m/w/d)

@ Brose Group | Bamberg, DE, 96052