Advent of Cyber 2022| [Day9]| TryHackMe write-up

Amol Rangari
2 min readDec 9, 2022

Learning Objectives

  • Using Metasploit modules and Meterpreter to compromise systems
  • Network Pivoting
  • Post exploitation


What is Docker?

Docker is a way to package applications, and the associated dependencies into a single unit called an image. This image can then be shared and run as a container, either locally as a developer or remotely on a production server. Santa’s web application and database are running in Docker containers, but only the web application is directly available via an exposed port. A common way to tell if a compromised application is running in a Docker container is to verify the existence of a /.dockerenv file at the root directory of the filesystem.

What is Metasploit?

Metasploit is a powerful penetration testing tool for gaining initial access to systems, performing post-exploitation, and pivoting to other applications and systems. Metasploit is free, open-source software owned by the US-based cybersecurity firm Rapid7.

What is a Metasploit session?

After successfully exploiting a remote target with a Metasploit module, a session is often opened by default. These sessions are often Command Shells or Meterpreter sessions, which allow for executing commands against the target. It’s also possible to open up other session types in Metasploit, such as SSH or WinRM — which do not require payloads.

Question:- 1) Deploy the attached VM, and wait a few minutes. What ports are open?

Answer:- 80

2) What framework is the web application developed with?


3) What CVE is the application vulnerable to?


4) What command can be used to upgrade the last opened session to a Meterpreter session?

Answer:-sessions -u -1

5)What file indicates a session has been opened within a Docker container?


6) What file often contains useful credentials for web applications?


7) What database table contains useful credentials?


8) What is Santa’s password?


9) What ports are open on the host machine?


10) What is the root flag?


Follow me on Medium and stay tuned for more write-ups.



Amol Rangari

I am Cyber Security Expert, Security Researcher and bug hunter