Recon
Let’s start with a nmap scan
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
| nmap -A 10.65.190.76
Starting Nmap 7.80 ( https://nmap.org ) at 2025-12-07 09:50 GMT
mass_dns: warning: Unable to open /etc/resolv.conf. Try using --system-dns or specify valid servers with --dns-servers
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Nmap scan report for 10.65.190.76
Host is up (0.00038s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Rick is sup4r cool
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=12/7%OT=22%CT=1%CU=32220%PV=Y%DS=1%DC=T%G=Y%TM=69354E1
OS:7%P=x86_64-pc-linux-gnu)SEQ(SP=107%GCD=1%ISR=107%TI=Z%CI=Z%II=I%TS=A)OPS
OS:(O1=M2301ST11NW7%O2=M2301ST11NW7%O3=M2301NNT11NW7%O4=M2301ST11NW7%O5=M23
OS:01ST11NW7%O6=M2301ST11)WIN(W1=F4B3%W2=F4B3%W3=F4B3%W4=F4B3%W5=F4B3%W6=F4
OS:B3)ECN(R=Y%DF=Y%T=40%W=F507%O=M2301NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A
OS:=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%
OS:Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=
OS:A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=
OS:Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%
OS:T=40%CD=S)
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.43 ms 10.65.190.76
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.86 seconds
|
Here we notice a ssh port seems like our entry way
Let’s investigate the website

So here we need to get the password to ssh to computer to get the secrets let’s use the [[tryhackme/Web Hacking/06 - Content Discovery/index]] to discover more about the website
found robots.txt
- I have found
Wubbalubbadubdub this and after searching I have found this 
I have found a username inspecting the website
Username: R1ckRul3s
let’s use gobuster we got login.php
- let try tologin with
R1ckRul3s:Wubbalubbadubdub and success
We are represented with a command prompt

let’s try ls
- Sup3rS3cretPickl3Ingred.txt
- we have found this but I have found that some commands are disabled so I tried less and it worked
and I also have found a clue.txt
- Look around the file system for the other ingredient.
So let’s follow this
- pwd got /var/www/html
- let’s traverse to get back with
ls ../../.. - Nice it was a success let’s see home directory by
ls ../../../home - we got rick and ubuntu let’s dive in rick
- we have found second ingredients and that is our second flag
let’s discover more to get the third flag
- let’s check our privilege
- I used
sudo -l and got- User www-data may run the following commands on ip-10-65-190-76: (ALL) NOPASSWD: ALL
- this means we can run any command in sudo
- let’s see root directory
sudo ls -al /root - I have found
3rd.txt - use
sudo less 3rd.txt and that’s it we got the third and final flag