TryHackMe Agent-T CTF Writeup: A Comprehensive Guide for Hackers.

 AGENT-T TRYHACKME WRITE-UP


TryHackme: Agent-T writeup -dp1h3r0x





Problems:

1. Find the flag.txt

 

Solutions:

 

Step1:- 



                    Enumeration the target machine using 'nmap' . 


Enumeration the target machine using nmap


you can see only 80 port is open,  so maybe a website is running, copy the ip and open the browser.

 

Admin dashboard of Agent-T tryhackme writeup

 

you can see, a admin dashboard is open, that's good , after that I am trying to upload a php shell, but I can't. So, I try to another way.



Step 2 :- 


                    Let's enum the website , what's services are running in the                  background. I used a simple tool [whatweb].


enum the website , what's services are running by whatweb tool


you can see the [php-8.1.0], let's check the versions of php any exploit is avaiable?


check the versions of php any exploit is avaiable


I found the [RCE] exploit in python code. So, see the code.


find the [RCE] exploit in python code






you can see only one user_input required in the target full host url.



Step 3 :- 

                           Let's go exploit the....., using this exploit.


exploit using this python exploit


I can access the shell perfectly, let's check the [Id] , root or anyuser.



get the flag of Agent-T Tryhackme CTF Challenge


you can see uid is root ,we are in root. Let's find the flag. You can see I found the flag.




THANK YOU FOR READING






0 Comments