`TryHackMe` : LazyAdmin CTF

TryHackMe : LazyAdmin CTF

In this part of our quest to becoming proficient Linux pen testers we need to put our expertise against an introductory level box, which supposedly has a lazy admin looking after it - should be straightforward enough I hope:

Obligatory nmap scan:

lazy-admin–nmap-scan

Looks like we have a webserver to investigate but as with many of these challenges we get presented with (initially) the default apache page:

lazy-admin–default-apache-page

With this overwhelming level of blandness I figured there must be a hidden directory somewhere ... So I let dirbuster run for a long time with the /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt - this gave me pretty much everything I needed to compromise the machine.

lazy-admin–dirbuster-one

lazy-admin–dirbuster-two