
A walkthrough of the TryHackMe UltraTech room — a grey-box style CTF focusing on enumeration, command injection, and Docker escape.
Task 1: Deploy the Machine
Start this room by hitting the “Deploy” button on the right. Once the machine is deployed, you will be assigned a vulnerable machine IP. It’s a grey-box style assessment — you only have the company’s name and the server’s IP address.
Task 2: It’s Enumeration Time
We begin with enumeration using Nmap. Below is the command used to scan all ports and detect service versions:
sudo nmap -Pn -n -sV -p- <target-ip>
Questions & Answers
1. Which software is using port 8081?
Ans: Node.js
2. Which other non-standard port is used?
Ans: 31331
3. Which software is using this port?
Ans: Apache
4. Which GNU/Linux distribution seems to be used?
Ans: Ubuntu
5. The software using port 8081 is a REST API. How many of its routes are used by the web application?
Ans: 2
Task 3: Let the Fun Begin
We check both HTTP ports exposed in our scan.
Port 8081
Port 31331
We check robots.txt
on port 31331 for any disallowed paths.
Inside partners.html
, we find some JavaScript functionality.
We test if command injection is possible using ping
.
Backticks in JavaScript evaluate commands. Using ls
reveals the presence of a SQLite database file.
Filename:
utech.db.sqlite
We use cat
to read it and extract password hashes.
Hash cracking reveals user credentials.
2. What is the first user’s password hash?
Ans: f357a0c52799563c7c7b76c1e7543a32
3. What is the password associated with this hash?
Ans: n100906
We now have SSH credentials and access to the machine as r00t
.
Task 4: The Root of All Evil
Once inside, we realize we are within a Docker container and need to escalate privileges to escape it and find the final flag.
We use a method from GTFOBins to escape Docker and spawn an interactive shell.
Finally, we locate the private SSH key of the root user.
What are the first 9 characters of the root user’s private SSH key?
Ans: MII******
Conclusion
This room offers a complete penetration test simulation with:
- Port & service enumeration
- Command injection via JavaScript
- Hash extraction and cracking
- Docker breakout and privilege escalation
An excellent practical exercise that highlights real-world exploitation scenarios from discovery to post-exploitation.