| Lab/Room | TryHackMe - Pentester |
|---|---|
| Type | Challenge |
| Statut | Done |
| Date | 08/03/2026 |
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
This room will cover accessing a Samba share, manipulating a vulnerable version of proftpd to gain initial access and escalate your privileges to root via an SUID binary.
The first step of the enumeration phase was to identify the exposed services on the target machine using Nmap. A service/version scan was performed with the -sV option in order to detect both open ports and the versions of the services running behind them.
nmap-sV10.114.172.165
During the scan, two warnings appeared indicating that the system could not read /etc/resolv.conf. This prevented reverse DNS resolution, but it did not impact the port scanning itself. The scan successfully identified the host as online with very low latency.
Out of the 1000 most common TCP ports scanned, 993 were closed, leaving a small number of exposed services that could potentially represent an attack surface.
The scan revealed several important open ports:
This set of services indicates that the machine exposes multiple network services commonly found in Linux environments, including file sharing protocols and remote access services.
From an attacker’s perspective, several services immediately stand out as promising enumeration targets: