Member-only story
TryHackMe | Source | Walkthrough
Exploit a Recent Webmin Vulnerability and Take Control
#Cybersecurity #Writeup #TryHackMe
The SOURCE room on TryHackMe challenges us to exploit a vulnerability in Webmin, a web-based system configuration tool. It’s a straightforward task but offers good practice for beginners. Let’s walk through it step by step.
Step 1: Enumeration with Nmap
As with any challenge, we begin with nmap to scan the target IP for open ports and services.
nmap -sV -sC -A source.thmResults:
- Port 22: SSH
- Port 10000: Webmin (default port)
The Webmin service becomes our point of entry. Accessing it through https://source.thm:10000 brings up the Webmin login page.
Unfortunately, we lack credentials for both SSH and Webmin.