top of page
Search

TryHackMe! Pickle Rick

  • Writer: Srivathsa Dhanvantri
    Srivathsa Dhanvantri
  • Aug 29, 2020
  • 3 min read

TryHackMe is an online platform that teaches Cybersecurity through hands-on virtual labs. Whether you are an expert or beginner, learn through a virtual room structure to understand theoretical and practical security elements.

ree

PickleRick is an easy room on TryHackMe for beginners to explore.

You have to first signup to join the room. There are few simple steps that you can follow in the Signup page. Next follow the steps in the Welcome room to configure the VPN connectivity.


I have connected to TryHackMe network using OpenVPN on Kali Linux. Once you connect, the access page will confirm the status by confirming your IP address and status.

ree

The Task is to find three ingredients. Click on Deploy to start the target machine.

ree

Allow few minutes for machine to boot up and all services to start. Once the IP address is displayed, start enumeration using nmap.

ree

The -sV option along with nmap will do a service finger printing as well. Port 22 and Port 80 are open. Explore the webservice using a web browser.

ree

The web page didn't give much of any clue. Check the source code of the web page.

ree

There is a Username revealed. That is in a comment as Note to self.

ree

Robots.txt has some random text. It could be a password. Keep a note of all findings. Use gobuster to enumerate directories.

ree

The gobuster with the help of wordlist common.txt found few pages which we have already checked. Run Nikto to see if there are any vulnerabilities or weak links.

ree

Nikto discovered a login.php page. Explore the page.

ree

It requires credentials to login. Use the Username found in the page source and also the test found in robots.txt as password.

ree

Once logged in we can see a command panel. Check by running few linux commands.

ree

The commands work and the command whoami returned the username as well.

ree

The pwd command revealed present working directory. Start exploring user home directories to find the ingredients required to complete the task.

ree

Looks like we have found a secret ingredient. We can't use many commands like cat or more. since they are all blacklisted. It can be checked from the source of the page. It contains all the blacklisted commands.

ree

We have found the first ingredient by using less command, Validate the same on TryHackMe.

ree

Two more to go.

ree

Check the file clue.txt

ree

The clue was to look around the filesystem. Also check whether the current user has any sudo permissions on the machine.

ree

The sudo -l command revealed that the current user has sudo permission to run all the commands on this machine. Use the sudo to list the contents of each of the home directories.

ree

There are two home directories. rick and ubuntu. Look for the ingredients within those home directories.

ree

We have found another secret ingredient. Validate the same on TryHackMe.

ree

One more to go. Check in the root directory.

ree

The ingredient may be in the file 3rd.txt

ree

Validate the 3rd ingredient on the TryHackMe.

ree

Congratulations!! you have found all the 3 secret ingredients.

ree

An alternate method would be to use commands to generate a reverse shell. This machine has a python running too. You can use python commands to spawn a reverse shell to your terminal with netcat.

Make sure to run netcat on a terminal on attacking machine. And use the python script in pentestmonkey to spawn a reverse shell. In this second method you may get a feel that you have PWNed the machine when compared to the first method.

Hope you try this out. Good Luck!!

I hope this write-up was informative for you. Please leave a feedback. Thank you

-Srivathsa Dhanvantri

 
 
 

Comments


©2025 by Srivathsa.

bottom of page