Post

Brooklyn99 - THM

Brooklyn99 - THM

🏴 BROOKLYN99 - Write-up


  • πŸ“„ DESCRIPTION :

This room is aimed for beginner level hackers but anyone can try to hack this box.

Lab-Link: https://tryhackme.com/room/brooklynninenine

Room difficulty : Easy 🟒

Date : 18/08/2025

image

Deploy the virtual machine : 10.10.58.152


  • πŸ‘£ STEPS :

RECON πŸ” :

We start with a nmap scan to find open ports on the target machine.

1
nmap -A 10.10.58.152 -T4

The options I use :

OPTIONMEANINGDESCRIPTION
-AAgressive ScanEnables OS detection, version detection, script scanning, and traceroute.
-T4Agressive TimingMakes the scan faster than the default but still relatively stable.

⚠️ Both are fine in CTFs or authorized tests but can be intrusive on real networks.

The scan reveals 3 open ports.

nmap

  • PORT 21 (FTP) vsftpd 3.0.3
  • PORT 22 (SSH) OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
  • PORT 80 (HTTP) Apache httpd 2.4.29 ((Ubuntu))

Anonymous FTP login is enabled, so we connect

Opening the file β€œnote_to_jake.txt” provides the first hint :

ftp


Next, we explore the website. By examining the source code, we discover a second clue:

WebPage WebPage

A Gobuster scan did not reveal anything interesting. So, I downloaded the image and tested it with different steganography tools.

Stegcracker

Opening the .out file reveals the following:

out

Next, we establish an SSH connection to the user Holts

πŸ“Œ Note: The IP address changed after a VM restart due to an issue.

userflag

πŸŽ‰ User flag captured



Privilege Escalation

After logging in as holt, we check which commands can be executed with elevated privileges using:

1
sudo -l

The output shows that /bin/nano can be executed as root by user holt.

By leveraging this, we run the following command to read the root flag:

1
sudo nano /root/root.txt

sudo

rootflag

πŸŽ‰ Root flag captured



βœ… Conclusion:

This room was a valuable exercise for practicing:

- Enumeration of services

- Steganography for hidden data extraction

- Privilege escalation via misconfigured sudo permissions

This post is licensed under CC BY 4.0 by the author.

Trending Tags