Overpass 2 — Hacked Walkthrough
这篇文章介绍了TryHackMe平台上的Overpass 2 — Hacked实验室挑战。参与者通过分析网络捕获文件(.pcap),使用Wireshark工具过滤TCP流,追踪攻击者行为并恢复系统控制权。该挑战展示了简单配置错误如何导致系统被完全攻破。 2025-4-30 06:6:53 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Sujal Meghwal

Hello everyone! This is Sujal, and today, I’ll be walking you through the Overpass 2 — Hacked lab on TryHackMe. This lab is a great starting point for anyone familiar with basic Linux commands, Wireshark, and privilege escalation techniques. The challenges are straightforward and provide a solid foundation for diving deeper into practical cybersecurity skills.

Let’s get started and explore the steps to successfully complete the lab!

In the Overpass 2 — Hacked challenge, we step into an incident where a web application has been defaced and back-doored by a malicious group. Our mission: trace the attacker’s footsteps through network captures, inspect the custom backdoor code, crack the credentials, and finally regain root. This exercise demonstrates how even simple misconfigurations and publicly-available tools can lead to full system compromise

Begin by downloading Wireshark and the associated .pcap file. Open the .pcap file in Wireshark. In the display filter bar, enter:

tcp.stream eq 1

This filter isolates TCP stream 1, which represents the complete conversation between two endpoints — from the initial handshake to the termination of the session. TCP streams are useful for reconstructing the full context of a connection, including payloads and interactive sessions.


文章来源: https://infosecwriteups.com/overpass-2-hacked-walkthrough-40c96d21c69b?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh