Agent T

https://tryhackme.com/room/agentt

Flag

As usual we start with basic enumeration using nmap

Now a more detailed scan

There's only one open port, let's check it

We see there's just a bootstrap template and we can't barely interact with it. If we go back to the nmap scan we performed earlier we see the service use "PHP cli server 5.5 or later (PHP 8.1.0-dev)"

If we look it that version up we see it's vulnerable and there's an exploit available

Now the only thing we have to do is download it (don't forget to check it out first) and execute it

We're in, the only thing to do now is find the flag and we are done

Last updated

Was this helpful?