SolidState

Gaining Access

Nmap scan:

JAMES Server

SMTP is open, which is rather suspicious. I connected via nc and tested some default credentials, and found that root:root worked.

Now that we are logged in, we can read some emails:

With this, we can SSH in as mindy.

Shell Escape

When in the user's directory, we find a restricted shell where we cannot execute a lot:

I researched a bit on how to escape this shell, and found that appending -t "bash --noprofile" works:

Privilege Escalation

Cronjob Injection

We can run pspy32 on this machine to view processes:

I found that we have write access over this file, so we can just append a reverse shell to it:

After waiting for a bit, we would catch a reverse shell: