ssh park@<machine_IP> In this task, we'll escalate privileges. Step 1: Enumeration Perform enumeration to gather more information about the system:
http://<machine_IP>/backup Download the backup file ( backup.zip ) and unzip it: jurassic park tryhackme
sudo python /usr/bin/jurassic Create a new Python script to exploit this: In this task
sudo python jurassic.py This will give you a root shell. In this task, we'll continue to escalate privileges. Step 1: Root Access You've already obtained a root shell. Now, find the root.txt flag: jurassic park tryhackme
nmap -sV <machine_IP> Replace <machine_IP> with the IP address provided by TryHackMe.
unzip backup.zip Inside the unzipped directory, you'll find a file called dinosaur.cfg . This file contains credentials: