To access material, start machines and answer questions login.
What port is the rdbms running on?
Metasploit contains a variety of modules that can be used to enumerate in multiple rdbms, making it easy to gather valuable information.
After starting Metasploit, search for an associated auxiliary module that allows us to enumerate user credentials. What is the full path of the modules (starting with auxiliary)?
What are the credentials you found?
example: user:password
What is the full path of the module that allows you to execute commands with the proper user credentials (starting with auxiliary)?
Based on the results of #6, what is the rdbms version installed on the server?
What is the full path of the module that allows for dumping user hashes (starting with auxiliary)?
How many user hashes does the module dump?
What is the full path of the module (starting with auxiliary) that allows an authenticated user to view files of their choosing on the server?
What is the full path of the module that allows arbitrary command execution with the proper user credentials (starting with exploit)?
Compromise the machine and locate user.txt
Escalate privileges and obtain root.txt
Created by
Room Type
Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!
Users in Room
10,851
Created
1800 days ago
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in