Anonymous

May 24, 2024

# Nmap 7.94 scan initiated Fri May 24 00:47:27 2024 as: nmap -T4 -oN nmap-all -p- 10.10.219.77
Warning: 10.10.219.77 giving up on port because retransmission cap hit (6).
Nmap scan report for 10.10.219.77
Host is up (0.29s latency).
Not shown: 65511 closed tcp ports (conn-refused)
PORT      STATE    SERVICE
21/tcp    open     ftp
22/tcp    open     ssh
139/tcp   open     netbios-ssn
191/tcp   filtered prospero
445/tcp   open     microsoft-ds
3750/tcp  filtered cbos-ip-port
15156/tcp filtered unknown
16428/tcp filtered unknown
20213/tcp filtered unknown
24559/tcp filtered unknown
25354/tcp filtered unknown
26359/tcp filtered unknown
27948/tcp filtered unknown
33394/tcp filtered unknown
35426/tcp filtered unknown
39278/tcp filtered unknown
42376/tcp filtered unknown
49129/tcp filtered unknown
51393/tcp filtered unknown
53243/tcp filtered unknown
56284/tcp filtered unknown
56454/tcp filtered unknown
60726/tcp filtered unknown
63401/tcp filtered unknown

# Nmap done at Fri May 24 01:16:10 2024 -- 1 IP address (1 host up) scanned in 1723.00 seconds
ftp 10.10.219.77
\

The user have a suid lxd group in the group part

I just did the same steps like i did in the "Gaming Server" room in tryhackme with some modifications

and get the root txt

The smb part is nonsense

smbclient -L 10.10.219.77
smbclient \\\\10.10.219.77\\pics

Last updated