To access material, start machines and answer questions login.
You can either use the browser-based terminal (which appears when you deploy the machine), or you can connect to TryHackMe's network (via OpenVPN) and SSH in directly. If you've not done this before, first complete the OpenVPN room and learn how to connect.
This room will teach you a variety of Linux privilege escalation tactics, including kernel exploits, sudo attacks, SUID attacks, scheduled task attacks, and more. This lab was built utilizing Sagi Shahar's privesc workshop (https://github.com/sagishahar/lpeworkshop) and utilized as part of The Cyber Mentor's Linux Privilege Escalation Udemy course (http://udemy.com/course/linux-privilege-escalation-for-beginners).
All tools needed to complete this course are in the user folder (/home/user/tools).
Let's first connect to the machine. SSH is open on port 22. Your credentials are:
username: TCM
password: Hacker123
What user's credentials were exposed in the OpenVPN auth file?
Who was TCM trying to log in as?
Naughty naughty. What was the password discovered?
What binary is SUID enabled and assists in the attack?
Created by
Room Type
Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!
Users in Room
27,670
Created
1873 days ago
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in