Summary

  • The room ‘Billing’ on TryHackMe is a VPN billing application called MagnusBilling is explored in this hack.
  • The application is discovered to be vulnerable to an unauthenticated remote code execution bug due to a lack of updating.
  • The vulnerability is perpetrated on the Linux machine by using Metasploit with the provided room details, permitting the user to procure a shell as the user asterisk.
  • The user can utilise the fail2ban-client set command to escalate privileges and execute arbitrary commands as root, gaining root flag access ultimately.
  • This exercise stresses the necessity for timely security updates, adequate privilege management, and cautious enumeration during pen testing apprenticeships.

By 0verlo0ked

Original Article