The room ‘Billing’ on TryHackMe is a VPN billing application called MagnusBilling is explored in this hack.
The application is discovered to be vulnerable to an unauthenticated remote code execution bug due to a lack of updating.
The vulnerability is perpetrated on the Linux machine by using Metasploit with the provided room details, permitting the user to procure a shell as the user asterisk.
The user can utilise the fail2ban-client set command to escalate privileges and execute arbitrary commands as root, gaining root flag access ultimately.
This exercise stresses the necessity for timely security updates, adequate privilege management, and cautious enumeration during pen testing apprenticeships.