Home THM Empline
Post
Cancel

THM Empline

The Great Escape

This is my writeup for the Tryhackme box that can be found here. There are three different flags for us to find, and a few hints that we will be attacking a docker container, so we will have to escape that and also get onto the machine by penetrating the webapp.

Considering this is a medium level CTF I’ll assume that the reader has general knowlege of Kali Linux and its suite of tools.

A Simple Webapp

Starting off with nmap port and service scans we find a couple open ports, 22 ssh and 80 http.

1
2
| http-robots.txt: 3 disallowed entries 
|_/api/ /exif-util /*.bak.txt$

I am going to add this host to the hostfile for ease of use during the encounter: escape.thm.

I am also going to add this to the burp target scope so we can then run feroxbuster through the burp proxy.

robots.txt

Checking /robots.txt we find a few things to check out.

1
2
3
4
5
User-agent: *
Allow: /
Disallow: /api/
# Disallow: /exif-util
Disallow: /*.bak.txt$

Goign to fuzz the /exif-util for extensions that end in .bak.txt

gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100 -u http://escape.thm/exif-util/ -x bak.txt --exclude-length 3834 -b 503

Here I am scanning with gobuster inside of /exif-util for the extension .bak.txt and excluding the noise which was length 3838 and the status codes 503.

This post is licensed under CC BY 4.0 by the author.