Brooklyn Nine-NineTryHackMe Logo

This engagement involved assessing a Linux-based target exposing FTP, SSH, and HTTP services. Initial enumeration revealed anonymous FTP access and a web application containing hidden clues, leading to credential discovery and full system compromise.

Reconnaissance

Port scanning revealed the following services:

The web server contained an image with hidden clues, suggesting steganography as a potential attack vector.

Initial Findings

Analysis of the web application revealed a hidden message within an image using steganography. Extracting the data exposed credentials for a valid user.

FTP access also revealed a note referencing weak password practices, indicating additional attack opportunities.

Key Finding: Credential Exposure via Steganography

Sensitive credentials were embedded within a publicly accessible image. This allowed attackers to extract authentication details using common steganography tools.

Combined with weak password practices, this created a direct path to system access.

Exploitation

SSH access was obtained using the extracted credentials. Additional user credentials were brute-forced due to weak password policies.

Privilege escalation was achieved through a misconfigured sudo permission allowing execution of nano. By leveraging nano’s command execution feature, a root shell was obtained.

sudo nano ^R^X reset; sh 1>&0 2>&0