Pickle Rick | TryHackMe

Nihir Zala
3 min readJan 22, 2023

--

This walkthrough is about the CTF challenge we have to find the flag by exploiting the target. So let’s dive into the Tryhackme challenge. After I started the machine I saw a webpage it looks

Then I further dig into a website I got a username through the source page

Then Search for password and login page for that I use dirsearch command to brute force the directories

After brute-forced I found out useful information such as robots.txt and login.php.

I dug into the robots.txt I got the password which is Wubbalubbadubdub

I use those credentials to login into the login.php

After logged in I found the shell successfully and I give some commands whether any useful information was hidden.

After I entered the ls command it showed some useful information

I use cat Sup3rS3cretPick13Ingred.txt in the shell but it is whitelisted

So I reverse connection from the system whether it would connect or not for that I use the list of commands from the pentest monkey website. First I used Perl command not worked then I moved on to python command which worked!!! Fine for me

I changed python to python3 It only worked!!!

After gaining the shell got the first flag using “cat Sup3rS3cretPick13Ingred.txt”

It was Mr . Meeseek Hair

Then further digging I got Second flag by privilege escalation

Using command python3 –c ‘import pty;pty.spawn(“/bin/bash”)’

By easy trick, I logged as a root user by using “sudo bash”

Then I got the second flag

Finally, I got 3rd flag by

--

--

Nihir Zala
Nihir Zala

Written by Nihir Zala

Hi there, I'm Nihir Zala—a Laravel developer from Gujrat, India, with over 2.5 years of professional experience. I also learning Penetesting from THM and HTB.

No responses yet