Sitemap

TryHackMe: Inclusion room walkthrough

3 min readJun 4, 2021

This is a write up covering steps taken to solve a beginner level security challenge on local file inclusion : Inclusion room in TryHackMe platform.

This blog is written as part of task of Masters Certification in Red Team Program from HackerU.

Step 1 : Connect to TryHackMe and start target machine.

  1. Download OpenVPN configuration setting from TryHackMe platform
  2. Connect to TryHackMe by running the command in kali terminal:

sudo openvpn /pathtoOVPNfile.ovpn

3. Start machine in ‘inclusion’ room — target ip address will be displayed in a minute.

https://tryhackme.com/room/inclusion

Step 2 : Information gathering using Nmap

  1. Start nmap scan of the target ip:

nmap -A -O <target ip>

Press enter or click to view image in full size
nmap output

Step 3: Detailed Findings

Open ports:

22 : SSH OpenSSH 7.6psi

80 : http Werkzeug httpd 0.16.0

1. Accessing open ports

port 80

Press enter or click to view image in full size

2. Click on View details under ‘LFI-attack’, got a hint for exploring LFI

Press enter or click to view image in full size
Highlight is the hint

3. Accessing ../../../../etc/passwd by entering it in url for ‘name’ parameter

http://10.10.xx.xxx/article?name=../../../../etc/passwd

passwd file is displayed which has 1 user with password highlighted below

Press enter or click to view image in full size

4. As port 22 is open, attempted SSH login with found user name and password and login was successful.

ssh <username>@<targetip>

Press enter or click to view image in full size

5. Found user.txt flag

6. To find root flag, checked for sudo privileges, found root NOPASSWD permission for /usr/bin/socat

sudo -l

Press enter or click to view image in full size

7. As user can gain root access through socat, search for sudo command to gain privileges in gtfobin

Press enter or click to view image in full size
Press enter or click to view image in full size

8. Run below command in kali, user gains root access

sudo socat stdin exec:/bin/sh

Press enter or click to view image in full size

9. Navigate to root folder and found root.txt

With these steps, I was able to answer questions posted in inclusion room on TryHackMe.

Thank you for reading this blog..

--

--

No responses yet