TryHackMe Steel Mountain Write Up

This is an older writeup I did before migrating this site to the new system. For that reason the writeup is missing my personal experience and thoughts as I went through it. It still works as a good guide for someone who is in need of some hints while working on it for themselves. 8-10-2025

Start the machine and head to the site its hosting

This page shows a picture of the employee of the month. Opening this image in a new tab shows that the file is named BillHarper.png, The awnser to our first question!

Scanning with nmap

Scanning the Machine shows that we also have port 8080 open. The -sV flag is telling me that it is a HttpFileServer.

Going to this web page on port 8080 shows that it is a file server. On the bottom of the page it can be seen that this is infact a Rejetto Http File Server

Finding Exploits

Doing a search on Exploit-db.com shows that this version of HFS has a remote code execution vulnerabillity.

Next, we can search on metasploit to see if there is anything we can use. Searching for “Rejetto” comes up with a remote code execution exploit.

Using Exploits

Making after setting the RHOSTS, RPORT and LHOST I ended up with these options.

After nearly 10 minutes of waiting the meterpreter shell was opened!

User Flag

I entered a shell and went to the user Bills desktop to find the user flag.

Escalating Privledges

The next step is to escalate our privileges. TryHackMe wants us to use a script for this. Upload PowerUp.ps1 to the target and enter powershell in order to execute the script.

We need to find the service with an unquoted service path vulnerabillity. This happens to be the first one on the list

This path is writable and we can restart it. So if we upload what we want and restart it then we can execute. We will need to make a MSFVenom payload and upload it to the machine

Then we need to stop the service with

move the file to the approperiate location

Start a netcat listener

And then restart the service

At this point the Netcat listener should’ve gotten a root shell!

Root Flag!

Now the root flag will be on the administrators desktop