AGENT-T TRYHACKME WRITE-UP
Problems:
1. Find the flag.txt
Solutions:
Step1:-
Enumeration the target machine using 'nmap' .
you can see only 80 port is open, so maybe a website is running, copy the ip and open the browser.
you can see, a admin dashboard is open, that's good , after that I am trying to upload a php shell, but I can't. So, I try to another way.
Step 2 :-
Let's enum the website , what's services are running in the background. I used a simple tool [whatweb].
you can see the [php-8.1.0], let's check the versions of php any exploit is avaiable?
I found the [RCE] exploit in python code. So, see the code.
you can see only one user_input required in the target full host url.
Step 3 :-
Let's go exploit the....., using this exploit.
I can access the shell perfectly, let's check the [Id] , root or anyuser.
you can see uid is root ,we are in root. Let's find the flag. You can see I found the flag.





![TryHackme: Agent-T writeup find the [RCE] exploit in python code](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSCimAw3shR6aDeuwV2EhuBwmBQidHE6ryQGJnSwXufsVt2WRHlgD3Xsrfq-FwOE-T-9eUt26jfx6vuk86iW8h3AWGSJOM0lgmVp1rzTCZ0oKF6W_2Nrxiqdp2PB1Kf5AYl2z1_3hh9vFgmzshjonnXiuh8Iz67VosFJFqJJZgc_sGoOHGYYvZ_DVocFTp/s16000/expolitv.png)


0 Comments