TryHackMe Lookup Boot to Root Walkthrough π
Step-by-step guide to solve the Lookup machine on TryHackMe, from login to root access. Perfect for beginners!

h00dy
14.7K views β’ Nov 24, 2024

About this video
In this video we are doing tryhackme's new boot to root machine - Lookup made by - [ https://tryhackme.com/r/p/josemlwdf ]. Here we have a basic login page based on the server response on trying to login we can brute force both username and password based on different error indicators upon loggin in with wrong credentials and We see how to brute force using both BurpSuite Intruder and hydra. After getting the correct creds, we got a redirection to a different subdomain where we found a command injection vulnerability in the elFinder 'Php Connector' and gain our initial foothold on the box. After our initial enumeration after getting www-data user shell, we found a custom suid binary that we can use to get a password wordlist for another user on the box. At last using our sudo perms for look command we can grab the id_rsa for root and get our last flag. Hope you'll learn something new. ππβ€οΈ
Please leave a comment!
[ tryhackme - https://tryhackme.com/r/room/lookup ]
βοΈ Video Contents β
β¨οΈ 0:00 β© Intro
β¨οΈ 0:42 β© Initial Enumeration on the webpage
β¨οΈ 12:27 β© Logging in with found creds
β¨οΈ 17:25 β© Getting initial foothold on the box using command injection exploit in elFinder 'Php Connector'
β¨οΈ 19:45 β© Privesc to another user using the found password wordlist
β¨οΈ 26:54 β© Getting root id_rsa
β¨οΈ 29:33 β© Final thoughts
Follow me on social media:
β https://twitter.com/hoodietramp
Writeups:
β https://blog.h00dy.me
β https://h00dy.gitbook.io
Github:
β https://github.com/hoodietramp
Mastodon:
β https://defcon.social/@h00dy
β https://infosec.exchange/@h00dy
Support This Tramp!
Donations are not required but are greatly appreciated!
πΈKo-Fi: https://ko-fi.com/h00dy
#tryhackme #ctf #boot2root #redteam #walkthrough #pentesting
Please leave a comment!
[ tryhackme - https://tryhackme.com/r/room/lookup ]
βοΈ Video Contents β
β¨οΈ 0:00 β© Intro
β¨οΈ 0:42 β© Initial Enumeration on the webpage
β¨οΈ 12:27 β© Logging in with found creds
β¨οΈ 17:25 β© Getting initial foothold on the box using command injection exploit in elFinder 'Php Connector'
β¨οΈ 19:45 β© Privesc to another user using the found password wordlist
β¨οΈ 26:54 β© Getting root id_rsa
β¨οΈ 29:33 β© Final thoughts
Follow me on social media:
β https://twitter.com/hoodietramp
Writeups:
β https://blog.h00dy.me
β https://h00dy.gitbook.io
Github:
β https://github.com/hoodietramp
Mastodon:
β https://defcon.social/@h00dy
β https://infosec.exchange/@h00dy
Support This Tramp!
Donations are not required but are greatly appreciated!
πΈKo-Fi: https://ko-fi.com/h00dy
#tryhackme #ctf #boot2root #redteam #walkthrough #pentesting
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
14.7K
Likes
193
Duration
31:04
Published
Nov 24, 2024
User Reviews
4.5
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.