mirror of
https://github.com/AbdullahRizwan101/CTF-Writeups
synced 2024-11-14 16:27:18 +00:00
Add files via upload
This commit is contained in:
parent
a2c3bbfcd7
commit
09a049332f
1 changed files with 117 additions and 0 deletions
117
Betava2j.md
Normal file
117
Betava2j.md
Normal file
|
@ -0,0 +1,117 @@
|
|||
# TryHackMe-Betav2j
|
||||
|
||||
## NMAP
|
||||
|
||||
```
|
||||
|
||||
Nmap scan report for 10.10.220.63
|
||||
Host is up (0.41s latency).
|
||||
Not shown: 997 closed ports
|
||||
PORT STATE SERVICE VERSION
|
||||
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
|
||||
| ssh-hostkey:
|
||||
| 2048 2c:54:c1:d0:05:91:e1:c0:98:e1:41:f2:b3:21:d9:6b (RSA)
|
||||
| 256 1e:ba:57:5f:29:8c:e4:7a:b4:e5:ac:ed:65:5d:8e:32 (ECDSA)
|
||||
|_ 256 7b:55:2f:23:68:08:1a:eb:90:72:43:66:e1:44:a1:9d (ED25519)
|
||||
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|
||||
|_http-server-header: Apache/2.4.29 (Ubuntu)
|
||||
3306/tcp open mysql MySQL 5.5.5-10.1.47-MariaDB-0ubuntu0.18.04.1
|
||||
| mysql-info:
|
||||
| Protocol: 10
|
||||
| Version: 5.5.5-10.1.47-MariaDB-0ubuntu0.18.04.1
|
||||
| Thread ID: 69
|
||||
| Capabilities flags: 63487
|
||||
| Some Capabilities: SupportsTransactions, ConnectWithDatabase, DontAllowDatabaseTableColumn, LongPassword, ODBCClient, Speaks41ProtocolOld, Support41Auth, IgnoreSigpipes, Speaks41ProtocolNew, FoundRows, SupportsLoadDataLocal, IgnoreSpaceBeforeParenthesis, InteractiveClient, SupportsCompression, LongColumnFlag, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
|
||||
| Status: Autocommit
|
||||
| Salt: :`Vl<)UProV?vX5?|vZ@
|
||||
|_ Auth Plugin Name: mysql_native_password
|
||||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
|
||||
|
||||
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
||||
Nmap done: 1 IP address (1 host up) scanned in 38.06 seconds
|
||||
```
|
||||
|
||||
## PORT 80
|
||||
|
||||
<img src="https://imgur.com/LFhMxAp.png"/>
|
||||
|
||||
Running gobuster on the web server
|
||||
|
||||
<img src="https://imgur.com/330CYFx.png"/>
|
||||
|
||||
These all were just rabbit holes
|
||||
|
||||
<img src="https://imgur.com/2mKpio4.png"/>
|
||||
|
||||
Looking at the memebers on the forum there's a member whith a white rabbit avatar
|
||||
|
||||
<img src="https://imgur.com/wQUEuOk.png"/>
|
||||
|
||||
So this hints us as the room description had a `follow the rabbit` picture
|
||||
|
||||
<img src="https://imgur.com/yQKolQ0.png"/>
|
||||
|
||||
We can see this user has some posts but when we try to view them it would not show them
|
||||
|
||||
<img src="https://imgur.com/3sw9YMm.png"/>
|
||||
|
||||
So let's try registring an account on `Linux-Bay` forum. I already registered on the forum before trying this so I'll login to the forum
|
||||
|
||||
<img src="https://imgur.com/jPYnMl0.png"/>
|
||||
|
||||
<img src="https://imgur.com/wVaicwC.png"/>
|
||||
|
||||
Now when you visit his profile you can see his post
|
||||
|
||||
<img src="https://imgur.com/wjgF3PK.png"/>
|
||||
|
||||
Here you can see a link to page
|
||||
|
||||
<img src="https://imgur.com/xzPvfRo.png"/>
|
||||
|
||||
<img src="https://imgur.com/0SdsaBA.png"/>
|
||||
|
||||
Viewing the source code we can find the link where white rabbit lead us
|
||||
|
||||
<img src="https://imgur.com/h0iu64R.png"/>
|
||||
|
||||
Visting the page /reportPanel.php we can see a bunch of bugs that people have reported
|
||||
|
||||
<img src="https://imgur.com/rvhHilj.png"/>
|
||||
|
||||
Now a hint is given to us that the vulnerability must be from the year 2021 so we have three vulnerabilites that are reported in 2021.
|
||||
|
||||
<img src="https://imgur.com/CBUOYsW.png"/>
|
||||
|
||||
<img src="https://imgur.com/gZgtqbR.png"/>
|
||||
|
||||
<img src="https://imgur.com/9xPFfBH.png"/>
|
||||
|
||||
I will be testing against weak credentials so fire up burp suite and intercept the login request
|
||||
|
||||
<img src="https://imgur.com/ckSpHzv.png"/>
|
||||
|
||||
Send request to intruder
|
||||
|
||||
<img src="https://imgur.com/gQlfOqO.png"/>
|
||||
|
||||
Set the payloads for username and passowrd
|
||||
|
||||
<img src="https://imgur.com/AdN4UGU.png"/>
|
||||
|
||||
<img src="https://imgur.com/v66B827.png"/>
|
||||
|
||||
<img src="https://imgur.com/PeV1TwM.png"/>
|
||||
|
||||
We can see that there's a change in length for those inputs so there's a chance that the message would be log in successful let's find out .
|
||||
|
||||
<img src="https://imgur.com/Gwo0z9j.png"/>
|
||||
|
||||
And we are logged in as a moderator
|
||||
|
||||
<img src="https://imgur.com/e225JVF.png"/>
|
||||
|
||||
As a moderator we can manage attachments so lets what we can dig from there
|
||||
|
||||
<img src="https://imgur.com/1YYfU26.png"/>
|
||||
|
Loading…
Reference in a new issue