TryHackMe CTF b3dr0ck

TryHackMe CTF b3dr0ck

Hello, guys back again with another walkthrough. This time we are going to get our hands dirty on CTF (b3dr0ck) from TryHackMe .

Enumeration through NMAP:

mp -sC -sV -A [IP]

No alt text provided for this image

After scanning go to web browser and check what's running on this IP

No alt text provided for this image

Here from the above picture barney is saying the port is over 9000!?

So here, I sense from the Nmap scan there is only one port which exceeds from 9000 and that was 9009 let's go and check it out further.

First, i checked netcat session on port 9009 if it's listening to something and in the below picture you can see that it's listening to ABC Server;

No alt text provided for this image

After got access on netcat, It was asked what I'm looking for??

I simply type help and i got

No alt text provided for this image

Now we know we have to find out 2 keys which is CERT and KEY

Then I type public and then private and got both keys

No alt text provided for this image

Now copy those keys and save them for further testing.

No alt text provided for this image

Now login to the SSL service which is running on port 54321 using following cmd:

socat stdio ssl:MACHINE_IP:54321,cert=<CERT_FILE>,key=<KEY_FILE>,verify=0

No alt text provided for this image

Here I got login access, Now i type help and got the password of the user barney

No alt text provided for this image

Now login with ssh using this passsword

No alt text provided for this image

Here i got flag of the barney user.

2. Finding Fred Password.

No alt text provided for this image

Now go to this directory and check?

sudo /usr/bin/certutil ls

No alt text provided for this image

Now check fred.certificate.pem directory

sudo /usr/bin/certutil cat fred.certificate.pem

No alt text provided for this image

Here i got the certificate and private key of the fred account. Save these keys

No alt text provided for this image

Now login to fred account with these keys with the same cmd as i used in barney account

socat stdio ssl:MACHINE_IP:54321,cert=<CERT_FILE>,key=<KEY_FILE>,verify=0

No alt text provided for this image

Here i got the password of the fred account?

3. Finding fred.txt flag

Now login with this password using ssh and get fred.txt flag

No alt text provided for this image

4. Finding root.txt flag.

No alt text provided for this image

Now go to https://crackstation.net/ and crack the hash we get above

No alt text provided for this image

After getting password of the root account go to terminal and get the flag

No alt text provided for this image

That's all guys the CTF is done. We have successfully capture FOUR flags. And i got full 120 points:

No alt text provided for this image

I hope you enjoyed the walkthrough if did like for me down below and follow me as well so that you won’t miss any upcoming future walkthroughs. Bye!

要查看或添加评论,请登录

Zakwan Abid的更多文章

  • Active Directory Exploitation Techniques

    Active Directory Exploitation Techniques

    In this AD network, I will cover several methods that can be used to exploit AD. This is by no means a complete list of…

  • TryHackMe CTF Hacker vs Hacker

    TryHackMe CTF Hacker vs Hacker

    Hello guys back again with another walkthrough this time we are going to get our hands dirty on CTF (Hacker vs. Hacker)…

    1 条评论
  • Active Directory Enumeration

    Active Directory Enumeration

    In this network, I will cover several methods that can be used to enumerate AD. This is by no means a complete list as…

    2 条评论
  • Linux Privilege Escalation Techniques

    Linux Privilege Escalation Techniques

    This write-up is based on the Linux PrivEsc room from Try Hack Me. Please find this room here:- https://tryhackme.

    1 条评论
  • Personal data from more than 533 Million Facebook users have been Leaked by hackers

    Personal data from more than 533 Million Facebook users have been Leaked by hackers

    In a massive data breach, the personal information of over 533 million Facebook users was leaked online. HIGHLIGHTS The…

    2 条评论

社区洞察

其他会员也浏览了