MACHINE_IP 10.10.195.170
8009
port open as ajp13 and searched in exploit-db for any exploitsskyfuck:8730281lkjlkjdqlksalks
tryhackme.asc
and credential.pgp
.tryhackme.asc
file with rockyou.txt and password found to be tryhackme:alexandru
tryhackme.asc
in gpg as gpg --import tryhackme.asc
and decrypted the credential.pgp
by gpg --decrypt credential.pgp
.merlin:asuyusdoiuqoilkda312j31k2j123j1g23g12k3g12kj3gk12jg3k12j3kj123j
and tried switching user in the ssh and VOILA./usr/bin/zip
as sudoer and got the exploit from the GTFOBins Zip and escalated the privileges to root.root.txt
in /root/root.txt