Blog

Date: 16, January, 2021

Author: Dhilip Sanjay S


Click Herearrow-up-right to go to the TryHackMe room.

Initial Setup

  • Inorder to get the blog running, enter the <MACHINE_IP> blog.thm in /etc/hosts.

Enumeration

  • Running Nmap

nmap -sV <MACHINE_IP> | tee nmap.output 
Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-16 16:19 IST
Nmap scan report for blog.thm (<MACHINE_IP>)
Host is up (0.18s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
80/tcp  open  http        Apache httpd 2.4.29 ((Ubuntu))
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
Service Info: Host: BLOG; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.63 seconds
  • Running wpscan along with user enumeration

  • After finding the usernames, add the two usernames kwheel, bjoel to a text file and then perform Password Bruteforcing attack using wpscan.

  • Using Metasploit:

  • You can notice that the exploit was successfully executed, but still there was no meterpreter shell.

  • This is because, I forgot to set LHOST to <TRYHACKME_IP>.

  • After setting my Tryhackme IP, I was able to get the meterpreter shell.

root.txt

  • Answer: 9a0b2b618bef9bfa7ac28c1353d9f318

  • Let's try to find out if there is any password in wp-config.php file.

  • That's the password for bjoel.



user.txt

  • Answer: c8421899aae571f7af486492b71a8ab7

  • Steps to reproduce:

Where was user.txt found?

  • Answer: /media/usb


What CMS was Billy using?

  • Answer: WordPress


What version of the above CMS was being used?

  • Answer: 5.0

  • By running wpscan.


Last updated