3.7 KiB
TryHackMe-Lian_YU CTF
Abdullah Rizwan , 1 spetember , 12:09 PM
NMAP
export IP=10.10.209.95
nmap -sC -sV $IP
Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-01 12:09 EDT
Nmap scan report for 10.10.209.95
Host is up (0.18s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.2
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u8 (protocol 2.0)
| ssh-hostkey:
| 1024 56:50:bd:11:ef:d4:ac:56:32:c3:ee:73:3e:de:87:f4 (DSA)
| 2048 39:6f:3a:9c:b6:2d:ad:0c:d8:6d:be:77:13:07:25:d6 (RSA)
| 256 a6:69:96:d7:6d:61:27:96:7e:bb:9f:83:60:1b:52:12 (ECDSA)
|_ 256 3f:43:76:75:a8:5a:a6:cd:33:b0:66:42:04:91:fe:a0 (ED25519)
80/tcp open http Apache httpd
|_http-server-header: Apache
|_http-title: Purgatory
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100024 1 37515/tcp status
| 100024 1 40883/udp status
| 100024 1 45950/tcp6 status
|_ 100024 1 59637/udp6 status
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
There wasn't anything useful on the web page but when I did directory force I found some interesting directories.
Dirbuster
When we visit that page we see nothing but text but if we select all the text or look at the source we can find the code word vigilante
.
Then continuing directory brute force i was able to find /island/2100
directory
Now it's giving us a hint that there is a .ticket
file so we can again do directory busting but this time I'll use gobuster
Gobuster
we can see an encoded message RTy8yhBQdscX
also a name Gambit
.
By searching this encoded text on google we will come up with the result telling us that this is base58 encoded
FTP
We logged in to ftp with user name vigilante
and password !#th3h00d
.
Here we can find 3 images.
on looking at Leave_Me_Alone.png
it gives us an error.
Here the header of png file is incorrect. Change the header of the image by using hexedit
.
Then press ctrl+x
to save.
Now the file format is correct and now let's the image.
We can also find another user named slade
so that Password
can be of that user.
I tried to use stegcracker
to view if there was any fild hidden with any of the images.
I got two text files from aa.png
.
And we logged in with slade
with the password from shado
file.
Privilege Escalation
We got root