Comment on page
Pickle Rick
- Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access to the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!

This machine was categorised as easy and it was pretty easy.

In as you can see 2 ports are open: 80 (HTTP) and 22 (SSH)
So, I launched legion to enumerate the HTTP service:

Note that in the image you can see that
robots.txt
contains the string Wubbalubbadubdub
After some seconds I reviewed what
disearch
has already discovered :

And as you may see in the last image a login page was discovered.
Checking the source code of the root page, a username is discovered:
R1ckRul3s

Therefore, you can login on the login page using the credentials
R1ckRul3s:Wubbalubbadubdub
Using those credentials you will access a portal where you can execute commands:

Some commands like cat aren't allowed but you can read the first ingredient (flag) using for example grep:

Then I used:

To obtain a reverse shell:

The second ingredient can be found in
/home/rick

The user www-data can execute anything as sudo:

- Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access to the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!
Last modified 7mo ago