Post

Tryhackme: Agent Sudo

Tryhackme: Agent Sudo

Tryhackme: Agent Sudo - 14 June 2k25

TryHackMe Logo

Agent Sudo


πŸ•΅οΈ Reconnaissance/ Enumerate - Task 1

Username: chris
Login: chris
Password: crystal


πŸ” Nmap Scan

Command:

1
sudo nmap -T4 -n -sC -sV -Pn -p- -oN fastscan.txt 10.10.5.56

Nmap Scan Screenshot


πŸ“‚ Directory Scan (Dirbuster)

Command:

1
dirbuster -u http://10.10.199.108/content/ -l /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 20

Directory Scan Screenshot


❓ Questions and Answers

#QuestionAnswer
1How many open ports?3
2How do you redirect yourself to a secret page?user-agent
3What is the agent name?chris

πŸ”‘ Hash Cracking & Brute-Force Task - 2

#QuestionAnswer
4FTP passwordcrystal
5Zip file passwordalien
6Steg passwordArea51
7Who is the other agent (full name)?james
8SSH passwordhackerrules!

🏁 Capture the User Flag Task - 3

SSH FLAG

#QuestionAnswer
9What is the user flag?b03d975e8c92a7c04146cfa7a5a313c7
10What is the incident of the photo called?Β 

⬆️ Privilege Escalation Task - 4

1
sudo -u#-1 /bin/bash

SSH FLAGS

#QuestionAnswer
11CVE number for the escalation (Format: CVE-xxxx-xxxx)CVE-2019-14287
12What is the root flag?b53a02f55b57d4439e3341834d70c062
13(Bonus) Who is Agent R?DesKel

πŸŽ‰ Happy Hacking!

β€œThe quieter you become, the more you are able to hear.”
β€” Agent Sudo


This post is licensed under CC BY 4.0 by the author.