Broker — TryHackMe

0xsanz
5 min readMar 12, 2021

This is the write-up for TryHackMe’s room named Broker. Description says: Paul and Max found a way to chat at work by using a certain kind of software. They think they outsmarted their boss, but do not seem to know that eavesdropping is quite possible…They better be careful… Interesting.This room can be found here:

https://tryhackme.com/room/broker

As always let’s scan the target with NMAP to what is running on the target.

Enumeration

NMAP

# Identify the list of services running on the target machine
⇒ sudo nmap -sS -Pn -T4 -p- 10.10.160.160

┌──(kali㉿kali)-[/]
└─$ sudo nmap -sS -Pn -T4 -p- 10.10.160.160
PORT STATE SERVICE
22/tcp open ssh
1883/tcp open mqtt
8161/tcp open patrol-snmp
42449/tcp open unknown

# Perform further information gathering on the open ports identified above
⇒ sudo nmap -O -A -Pn -T4 -p22,1883,8161,42449 10.10.160.160

┌──(kali㉿kali)-[/]
└─$ sudo nmap -O -A -Pn -T4 -p22,1883,8161,42449 10.10.160.160

PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH…

--

--

0xsanz
0xsanz

Written by 0xsanz

Software Developer having keen interest in Security, Privacy and Pen-testing. Certs:- Security+,PenTest+,AZ900,AZ204,AZ500

No responses yet