Skip to main content

Command Palette

Search for a command to run...

THM WriteUP | Epoch

Updated
1 min read
THM WriteUP | Epoch
S

Professional pentester, technical writer, telegram channel owner

Intro

Hello ethical hackers! Today we are going to pass the Epoch on TryHackMe. This lab has tags: CLI, Epoch.

Recon

Scanning

For no need to enter IP again and again. I exported IP like a variable in current bash shell.

export IP=*.*.*.*

Then i scan the host with rustscan.

Web recon

Okey, found ssh and http server. Let's analyze web:

Hm... We see time converter. In source code nothing intersting.

Try to test it:

I tried XSS, SQLi, but nothing works... I back to machine description and reread it.

Wait... it doesn't need to be online, you say? Are you telling me there is a command-line Linux program that can already do the same thing.

Command Injection

That sounds like a hint. Try to command injection this form.

Nice, it works! May be try spawn reverse shell?

Yep! We have access to the machine. But we don't see flag in home directory...

Flag

Check env and yeah, we found flag!

More from this blog

Инъекция XSS в скрытых полях ввода и мета-тегах

​Введение​ В этом посте автор покажет, как вы можете использовать новую функцию всплывающих окон HTML в Chrome для эксплуатации XSS в мета-тегах и скрытых полях ввода. Все началось, когда я заметил новое поведение всплывающих окон в Chrome на Twitter...

Jul 13, 20233 min read178
Инъекция XSS в скрытых полях ввода и мета-тегах

Zybnev Sergey | Pentester | Blog

19 posts

Professional pentester, programmer and web designer.