Lian_Yu

Date: 30, June, 2021

Author: Dhilip Sanjay S


Click Herearrow-up-right to go to the TryHackMe room.

Enumeration

Nmap

nmap -sC -sV -p- 10.10.4.71 -oN nmap.out
Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-30 11:51 IST
Nmap scan report for 10.10.4.71
Host is up (0.17s latency).
Not shown: 65530 closed ports
PORT      STATE SERVICE VERSION
21/tcp    open  ftp     vsftpd 3.0.2
22/tcp    open  ssh     OpenSSH 6.7p1 Debian 5+deb8u8 (protocol 2.0)
| ssh-hostkey: 
|   1024 56:50:bd:11:ef:d4:ac:56:32:c3:ee:73:3e:de:87:f4 (DSA)
|   2048 39:6f:3a:9c:b6:2d:ad:0c:d8:6d:be:77:13:07:25:d6 (RSA)
|   256 a6:69:96:d7:6d:61:27:96:7e:bb:9f:83:60:1b:52:12 (ECDSA)
|_  256 3f:43:76:75:a8:5a:a6:cd:33:b0:66:42:04:91:fe:a0 (ED25519)
80/tcp    open  http    Apache httpd
|_http-server-header: Apache
|_http-title: Purgatory
111/tcp   open  rpcbind 2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100024  1          40210/udp6  status
|   100024  1          42267/tcp   status
|   100024  1          47133/udp   status
|_  100024  1          54856/tcp6  status
42267/tcp open  status  1 (RPC #100024)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 445.65 seconds

Gobuster

Home Page

Home Page

Island Folder

Island

FTP

  • vigilante is a valid username for FTP.

  • But we don't have the password!!


Digging Deeper

What is the Web Directory you found?

  • Answer: 2100

  • Steps to Reproduce:

    • Perform a gobuster dir search inside the /island/ folder

File Extension Clue

  • The Youtube video seems was not found!!

2100
  • But we have a clue about the extension of the file .ticket.

What is the file name you found?

  • Answer: green_arrow.ticket

  • Steps to Reproduce:

    • Perform a gobuster dir search inside the /island/2100/ folder.

    • Use the extension ticket


FTP Access

What is the FTP Password?

  • Visit island/2100/green_arrow.ticket.

  • You'll find the base58 encoded version of the FTP password

Download the files

  • Download all the files in the ftp folder:

Other users

  • We can also check the other users (can be used later) by escaping out of that directory:

  • I couldn't find anyother information with FTP!


Steganography

  • In the attacker machine, use stegcracker and steghide over the image aa.jpg:

  • You can use zsteg to analyze other png images.


Initial Access

What is the file name with SSH password?

  • Answer: shado

  • Steps to Reproduce:

SSH Access - slade

  • The password didn't work the vigilante user.

  • By checking it for the other user slade:

user.txt


Privilege Escalation

  • Check slade user's sudo permission.

  • He can run pkexec. So, we can escalate privilege:

root.txt

  • Find the root flag inside root directory:

  • It was a fun and interesting machine to root!!


Last updated