Member-only story

THM - Pyrat

Francesco Pastore
6 min readMar 16, 2025

--

A writeup for the room Pyrat on TryHackMe

Test your enumeration skills on this boot-to-root machine.

Footprinting

We can start by doing a simple scan with nmap.

nmap -sS MACHINE_IP

There are two open ports: 22 (SSH) and 8000 (HTTP server).

If we try to go to the homepage on the webserver we see only the following message.

User

Reverse shell as www-data

More basic than HTTP communication might be a simple netcat connection to this port.

If we try with nc, we get something like a shell, which can be easily identified as a Python interpreter.

--

--

Francesco Pastore
Francesco Pastore

Written by Francesco Pastore

An engineering student in Milan and a web developer for an IT company. Write about programming and cybersecurity topics.

No responses yet