Looking Glass
February 10, 2024
First we need to see the open ports in the machine

Once i tried connecting to the ssh ports i get this message
ssh -oHostKeyAlgorithms=+ssh-rsa -o "StrictHostKeyChecking=no" 10.10.7.125 -p 9001
Then i tried accessing the lowest port which is 13783
It says higher which is the opposite of lower

After several attempt on trying the numbers in between

I guessed the correct port and it returns this

Then after looking up into the google this looks like a vigenere cipher
Thus, I will be using this decoder online to decipher. Here's the link

And i get the result

The secret is bewareTheJabberwock
After i put the secret into the ssh
It returns this



Then after that we will run linpeas in the machine

We see some interesting file that is being run by tweedledum user

Then we will put a reverse shell to it so that we can get the tweedledum user

As we can see we can execute the reboot with sudo


After we reboot the machine we see that we got the reverse shell from user tweedledum

Then we cat the txt file in the home directory of that user

Then we actually go to online hash identifier which is this

We see that we get the decrypted SHA256 code here
maybe one of these is the password the password is zyxwvutsrqponmlk
As we can see the users in the /etc/passwd

We will assume that this password belongs to user humptydumpty

Looks like we can't run any sudo in the humptydumpty user

But as we can see we can execute some commands in the alice home directory

After some help from the internet I figured that we can cat the id_rsa of user alice

Then we will just use this key to connect to alice user

When we did linpeas in alice user we discover this




Last updated