TryHackMe-Anthem

From aldeid
Jump to navigation Jump to search

Anthem

Exploit a Windows machine in this beginner level challenge.

[Task 1] Website Analysis

This task involves you, paying attention to details and finding the ‘keys to the castle’.

This room is designed for beginners, however, everyone is welcomed to try it out!

Enjoy the Anthem.

In this room, you don’t need to brute force any login page. Just your preferred browser and Remote Desktop.

Please give the box up to 5 minutes to boot and configure.

#1 - Let’s run nmap and check what ports are open.

PORT      STATE SERVICE       VERSION
80/tcp    open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-robots.txt: 4 disallowed entries 
|_/bin/ /config/ /umbraco/ /umbraco_client/
|_http-title: Anthem.com - Welcome to our blog
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds?
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: WIN-LU09299160F
|   NetBIOS_Domain_Name: WIN-LU09299160F
|   NetBIOS_Computer_Name: WIN-LU09299160F
|   DNS_Domain_Name: WIN-LU09299160F
|   DNS_Computer_Name: WIN-LU09299160F
|   Product_Version: 10.0.17763
|_  System_Time: 2020-06-07T19:14:04+00:00
| ssl-cert: Subject: commonName=WIN-LU09299160F
| Not valid before: 2020-04-04T22:56:38
|_Not valid after:  2020-10-04T22:56:38
|_ssl-date: 2020-06-07T19:14:21+00:00; +1s from scanner time.
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  msrpc         Microsoft Windows RPC
49671/tcp open  msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2020-06-07T19:14:08
|_  start_date: N/A

#2 - What port is for the web server?

Answer: 80

#3 - What port is for remote desktop service?

Answer: 3389

#4 - What is a possible password in one of the pages web crawlers check for?

Hint: fill in the gap *****.txt*

$ curl -s http://10.10.77.86/robots.txt
UmbracoIsTheBest!

# Use for all search robots
User-agent: *

# Define the directories not to crawl
Disallow: /bin/
Disallow: /config/
Disallow: /umbraco/
Disallow: /umbraco_client/

Answer: UmbracoIsTheBest!

#5 - What CMS is the website using?

Answer: ubmbraco

#6 - What is the domain of the website?

$ curl -s http://10.10.77.86/ | grep -E "<title>(.*)</title>"
    <title>Anthem.com - Welcome to our blog</title>

Answer: anthem.com

#7 - What’s the name of the Administrator

Hint: Consult the Oracle.(your favourite search engine)

One of the posts is referring to the admin and there is a poem:

$ curl -s http://10.10.29.47/archive/a-cheers-to-our-it-department/ | html2text 
[ ](/)

#  [ Anthem.com ](/)

##  Welcome to our blog

  * [Categories](/categories)
  * [Tags](/tags)
  * 

# A cheers to our IT department

Tuesday, December 31, 2019

During our hard times our beloved admin managed to save our business by
redesigning the entire website.

As we all around here knows how much I love writing poems I decided to write
one about him:

Born on a Monday,  
Christened on Tuesday,  
Married on Wednesday,  
Took ill on Thursday,  
Grew worse on Friday,  
Died on Saturday,  
Buried on Sunday.  
That was the end…

Share this post

[ __ Twitter ](http://twitter.com/share?text=A cheers to our IT
department&url=http://10.10.29.47/archive/a-cheers-to-our-it-department/) [
__ Facebook
](https://www.facebook.com/sharer/sharer.php?u=http://10.10.29.47/archive/a-cheers-
to-our-it-department/) [ __ Google+
](https://plus.google.com/share?url=http://10.10.29.47/archive/a-cheers-to-
our-it-department/)

Author

####  James Orchard Halliwell

_To enable comments sign up for a[Disqus](http://disqus.com) account and enter
your Disqus shortname in the Articulate node settings. _

Welcome to our blog  (C) 2020 [Anthem.com](/). All rights reserved.

The poem was written by Solomon Grundy.

#8 - Can we find find the email address of the administrator?

Hint: There is another email address on the website that should help us figuring out the email pattern used by the administrator.

One of the posts on the blog discloses an email address:

$ curl -s http://10.10.29.47/archive/we-are-hiring/ | html2text 
[ ](/)

#  [ Anthem.com ](/)

##  Welcome to our blog

  * [Categories](/categories)
  * [Tags](/tags)
  * 

# We are hiring

Monday, January 20, 2020

Hi fellow readers,

We are currently hiring. We are looking for young talented to join a good
cause and keep this community alive!

If you have an interest in being a part of the movement send me your CV at
[email protected]

Share this post

[ __ Twitter ](http://twitter.com/share?text=We are
hiring&url=http://10.10.29.47/archive/we-are-hiring/) [ __ Facebook
](https://www.facebook.com/sharer/sharer.php?u=http://10.10.29.47/archive/we-
are-hiring/) [ __ Google+
](https://plus.google.com/share?url=http://10.10.29.47/archive/we-are-
hiring/)

Author

####  [Jane Doe](/authors/jane-doe/)

Author for Anthem blog

_To enable comments sign up for a[Disqus](http://disqus.com) account and enter
your Disqus shortname in the Articulate node settings. _

Welcome to our blog  (C) 2020 [Anthem.com](/). All rights reserved.

The author is Jane Doe and the email address is [email protected].

Based on this pattern, we can guess Solomon Grundy’s email address:

Answer: [email protected]

[Task 2] Spot the flags

Our beloved admin left some flags behind that we require to gather before we proceed to the next task..

#1 - What is flag 1?

Hint: Have we inspected the pages yet?

The flag appears in the meta content of the “we-are-hiring” page:

$ curl -s http://10.10.29.47/archive/we-are-hiring/ | grep THM
<meta content="THM{L0L_WH0_US3S_M3T4}" property="og:description" />
        <input type="text" name="term" placeholder="Search...                               THM{G!T_G00D}" />

Flag1: THM{L0L_WH0_US3S_M3T4}

#2 - What is flag 2?

Hint: Search for it

The flag appears in the source code of the main page:

 curl -s http://10.10.29.47/ | grep THM
        <input type="text" name="term" placeholder="Search...                               THM{G!T_G00D}" />

Flag1: THM{G!T_G00D}

#3 - What is flag 3?

Hint: Profile

The flag appears on Jane Doe’s profile page:

$ curl -s http://10.10.77.86/authors/jane-doe/ | grep -o "THM{.*}"
THM{G!T_G00D}
THM{L0L_WH0_D15}">THM{L0L_WH0_D15}

Flag3: THM{L0L_WH0_D15}

#4 - What is flag 4?

Hint: Have we inspected all the pages yet?

The flag appears in the meta content of the “a-cheers-to-our-it-department” page:

$ curl -s http://10.10.29.47/archive/a-cheers-to-our-it-department/ | grep THM
<meta content="THM{AN0TH3R_M3TA}" property="og:description" />
        <input type="text" name="term" placeholder="Search...                               THM{G!T_G00D}" />

Flag4: THM{AN0TH3R_M3TA}

[Task 3] Final stage

Let’s get into the box using the intel we gathered.

#1 - Let’s figure out the username and password to log in to the box.(The box is not on a domain)

You can connect to http://10.10.29.47/umbraco/ using the information found previously: * username: [email protected] * password: UmbracoIsTheBest!

#2 - Gain initial access to the machine, what is the contents of user.txt?

Now, let’s try to connect via RDP with: * username: SG * password: UmbracoIsTheBest!

User flag: THM{N00T_NO0T}

#3 - Can we spot the admin password?

Hint: It is hidden.

There is a hidden backup directory on the C:\ drive, that contains a file named restor.txt. Give it permissions:

C:\>dir /a:hd
 Volume in drive C has no label.
 Volume Serial Number is 1225-5238

 Directory of C:\

15/09/2018  08:19    <DIR>          $Recycle.Bin
05/04/2020  23:42    <DIR>          backup
05/04/2020  10:56    <JUNCTION>     Documents and Settings [C:\Users]
05/04/2020  14:46    <DIR>          ProgramData
05/04/2020  10:56    <DIR>          Recovery
05/04/2020  10:55    <DIR>          System Volume Information
               0 File(s)              0 bytes
               6 Dir(s)  46,857,580,544 bytes free

C:\>cd backup

C:\backup>dir
 Volume in drive C has no label.
 Volume Serial Number is 1225-5238

 Directory of C:\backup

05/04/2020  23:42                21 restore.txt
               1 File(s)             21 bytes
               0 Dir(s)  46,857,580,544 bytes free

C:\backup>more restore.txt
ChangeMeBaby1MoreTime

C:\backup>

Answer: ChangeMeBaby1MoreTime

#4 - Escalate your privileges to root, what is the contents of root.txt?

Root flag: THM{Y0U_4R3_1337}