Anthem - TryHackMe
This write-up is based on TryHackMe's room named Anthem:-
This is a beginner level challenge on a Widows Machine.
[Task 1] Website Analysis
#1 Let's run nmap and check what ports are open:-
kali@kali:~$ sudo nmap -sS -sC -A 10.10.233.121 Starting Nmap 7.80 ( https://nmap.org ) at 2020-07-13 14:16 EDT Nmap scan report for 10.10.233.121 Host is up (0.024s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds? 3389/tcp open ms-wbt-server Microsoft Terminal Services | rdp-ntlm-info: | Target_Name: WIN-LU09299160F | NetBIOS_Domain_Name: WIN-LU09299160F | NetBIOS_Computer_Name: WIN-LU09299160F | DNS_Domain_Name: WIN-LU09299160F | DNS_Computer_Name: WIN-LU09299160F | Product_Version: 10.0.17763 |_ System_Time: 2020-07-13T18:17:30+00:00 | ssl-cert: Subject: commonName=WIN-LU09299160F | Not valid before: 2020-04-04T22:56:38 |_Not valid after: 2020-10-04T22:56:38 |_ssl-date: 2020-07-13T18:18:11+00:00; -1s from scanner time. No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=7.80%E=4%D=7/13%OT=80%CT=1%CU=37572%PV=Y%DS=2%DC=T%G=Y%TM=5F0CA56 OS:5%P=x86_64-pc-linux-gnu)SEQ(SP=108%GCD=1%ISR=10C%TI=I%CI=I%II=I%SS=S%TS= OS:U)OPS(O1=M508NW8NNS%O2=M508NW8NNS%O3=M508NW8%O4=M508NW8NNS%O5=M508NW8NNS OS:%O6=M508NNS)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70)ECN(R=Y% OS:DF=Y%T=80%W=FFFF%O=M508NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD= OS:0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W=0%S OS:=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R= OS:Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F= OS:R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T OS:=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80%CD= OS:Z) Network Distance: 2 hops Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: | smb2-security-mode: | 2.02: |_ Message signing enabled but not required | smb2-time: | date: 2020-07-13T18:17:33 |_ start_date: N/A TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 22.42 ms 10.9.0.1 2 22.55 ms 10.10.233.121 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 76.56 seconds
The Following ports are open:-
- 80
- 135
- 139
- 445
- 3389
#2 What port is for the web server?
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
#3 What port is for remote desktop service?
3389/tcp open ms-wbt-server Microsoft Terminal Services
#4 What is a possible password in one of the pages web crawlers check for?
Robots.txt :- Read about them here:- https://www.cloudflare.com/learning/bots/what-is-robots.txt/
#5 What CMS is the website using?
Let run dirsearch to find out the directories:-
Running Dirb also produces some interesting results:-
#6 What is the domain of the website?
Its right there :)
Using NMAP:-
nmap -n -p80 --script=http-title 10.10.69.79
Using WhatWeb:-
#7 What's the name of the Administrator?
Oh well well well. Don't think much for this. Just read the content of the pages and you should be OK. Hint==> There is no standard name for Admin User!
#8 Can we find find the email address of the administrator?
Format is in one of the webpages. Look for it.
[Task 2] Spot the flags
#1 What is flag 1?
Always check the Page Source of the Web Pages:-
#2 What is flag 2?
Always check the Page Source of the Web Pages:-
#3 What is flag 3?
Look around in web pages:-
#4 What is flag 4?
Look more:-
[Task 3] Final stage
#1 Let's figure out the username and password to log in to the box.(The box is not on a domain)
Well we have the Admin Username and one password by now. Try that.
#2 Gain initial access to the machine, what is the contents of user.txt?
Use the creds from last step and get the user.txt. Use rdesktop from kali.
#3 Can we spot the admin password?
How to see hidden folders:-
Search for hidden files recursively using command line in the C: drive:-
#4 Escalate your privileges to root, what is the contents of root.txt?
We cannot read the file:-
Read about icacls here:- https://ss64.com/nt/icacls.html
Got Access:-
Run cmd.exe as Adminstratoruse the root password found,,find and read the root.txt:-
Thats all!
Comments
Post a Comment