TryHackMe, — TechSupport1 Walkthrough | Full Step-by-Step Guide

TryHackMe, — TechSupport1 Walkthrough | Full Step-by-Step Guide

This article details a comprehensive penetration test on a simulated scammer’s website, highlighting techniques such as web enumeration, SMB share discovery, credential decoding, and exploiting vulnerabilities using Metasploit. It demonstrates how attackers can escalate privileges to obtain root access. #SubrionCMS #Metasploit

Keypoints

  • Initial recon involved aggressive Nmap scans to identify open services like SSH, Apache, and SMB.
  • SMB shares were enumerated, revealing a share containing a file with credentials.
  • Web directory scanning confirmed the presence of vulnerable Subrion and WordPress applications.
  • Exploitation of a known vulnerability in Subrion CMS v4.2.1 granted remote code execution via file upload.
  • Privilege escalation was achieved by exploiting misconfigured sudo permissions, leading to root access.

Read More: https://infosecwriteups.com/tryhackme-techsupp0rt1-walkthrough-full-step-by-step-guide-db0758109ad9?source=rss—-7b722bfd1b8d—4