Mcsysadmin has been super excited with their new security role, but wants to learn even more. In an attempt to show their l33t skills, they have found a new box to play with.
This challenge accumulates all the things you’ve learnt from the previous challenges(that being said, it may be a little more difficult than the previous challenges). Here’s the general way to attempt exploitation when just given an IP address:
- Start out with an NMAP scan to see what services are running
- Enumerate these services and try exploit them
- use these exploited services to get an initial access to the host machine
- enumerate the host machine to elevate privileges
Credit to DarkStar7471 for creating this challenge! Not all tasks will include supporting material!
Setup
1gobuster dir -u http://10.10.98.16 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
1gobuster dir -u http://10.10.98.16 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt2===============================================================3Gobuster v3.0.14by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)5===============================================================6[+] Url: http://10.10.98.167[+] Threads: 108[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt9[+] Status codes: 200,204,301,302,307,401,40310[+] User Agent: gobuster/3.0.111[+] Timeout: 10s12===============================================================132020/05/08 16:24:29 Starting gobuster14===============================================================15**/retro (Status: 301)**

http://10.10.98.16/retro/index.php/2019/12/09/ready-player-one/
One Comment on “Ready Player One”
Wade December 9, 2019
Leaving myself a note here just in case I forget how to spell it: parzival
Now we can try to log to the wordpress admin with the creds given by the user
1username : Wade2password : parzival
http://10.10.98.16/retro/wp-login.php
After trying many attempts to get a reverse shell working with WordPress, i’m going to try an another attack.
With the nmap scan we discover the port 3389
180/tcp open http syn-ack Microsoft IIS httpd 10.02| http-methods:3| Supported Methods: OPTIONS TRACE GET HEAD POST4|_ Potentially risky methods: TRACE5|_http-server-header: Microsoft-IIS/10.06|_http-title: IIS Windows Server73389/tcp open ms-wbt-server syn-ack Microsoft Terminal Services8| rdp-ntlm-info:9| Target_Name: RETROWEB10| NetBIOS_Domain_Name: RETROWEB11| **NetBIOS_Computer_Name: RETROWEB**12| DNS_Domain_Name: RetroWeb13| DNS_Computer_Name: RetroWeb14| Product_Version: 10.0.1439315|_ **System_Time: 2020-05-08T20:33:08+00:00**16| ssl-cert: Subject: commonName=RetroWeb17| Issuer: commonName=RetroWeb18| Public Key type: rsa19| Public Key bits: 204820| Signature Algorithm: sha256WithRSAEncryption21| Not valid before: 2020-05-07T20:02:5022| Not valid after: 2020-11-06T20:02:5023| MD5: 9b6b 0322 e36d 74e5 9334 0313 35dd 81b724| SHA-1: 410c 8275 4f20 c2f8 b943 1927 40b8 de27 af29 f8bf25| -----BEGIN CERTIFICATE-----26| MIIC1DCCAbygAwIBAgIQKUOrPeP7+aVM6j6diuzmUDANBgkqhkiG9w0BAQsFADAT27| MREwDwYDVQQDEwhSZXRyb1dlYjAeFw0yMDA1MDcyMDAyNTBaFw0yMDExMDYyMDAy28| NTBaMBMxETAPBgNVBAMTCFJldHJvV2ViMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A29| MIIBCgKCAQEAoRk88D0fxMB6g1Dn+Jv1eJ1Xa7SDi8/T77KlhNRH7bpWKIRupqyr30| JW0LeS48uUjfgGhqpaPgsdkNHjU7r+kyco6wSzYPt4AsHVW2/M/9lqxZ9JjXxjnF31| DCtV1LmZe6l9Oi1q/DTU8o57wLpgXCRTSZMYD8DWCq4o/NCQgKF36b19g/Q8IOzB32| mVSPEgHRzzf09idzVTTWYMg5f36ZQufnsGEAQB06/tjZs20PngSYj9o+m+Idobri33| w+AFqxOB2OomuveSDXHawgWNoKGEqHEgkCNO4OR6onFo+gOVkI5Wn5ppZw86BtwQ34| /qg1VrdRQlDvxPSwEUMywjHhJD7dTjKp8QIDAQABoyQwIjATBgNVHSUEDDAKBggr35| BgEFBQcDATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcNAQELBQADggEBAJ8A3kLh+U1n36| MjAGFIdOU/aoX5tKVAOGQI7NhCStR4V8rt1jzl83t5LYDRgu4BvwJmzpqTu2jlBM37| ORPnyaa+UfQmsA/P8itYmDRuGEWBnVAwWgfykfKlxDvxowhsIGQvulgUF4BuH+6I38| LEeZNSNPh3U7cCdQelEp5Uf+NikhEOnyAwbcABdJMm/QRazFtbnvV0vI6bWuudj839| ykqlasuZ/rFn9AXbEL4uHEZH9OmvOkZj4jPxrcxE9zN1SFcuEa6wBV8S7j9Ryvka40| VG1J8q2FsO4kouO23MCi3IN8aeFA9fKOAO2co+1VGiunpjC1p/Wsi5gRzzdw0J6u41| nJ82sCcskO0=42|_-----END CERTIFICATE-----43|_ssl-date: 2020-05-08T20:33:09+00:00; +4s from scanner time.44Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
As you can see with the output, you can validate that there is a “Computer Name” and we can maybe try to access it with the previous creds that we have.
How to connect to a remote desktop from Linux
1sudo apt-get install -y remmina
#1 A web server is running on the target. What is the hidden directory which the website lives on?
1/retro
#2 Gain initial access and read the contents of user.txt


13b99fbdc6d430bfb51c72c651a261927
#3 [Optional] Elevate privileges and read the content of root.txt

As you can see, there is a bookmark on the google chrome session, let’s try it !
https://www.youtube.com/watch?v=3BQKpPNlTSo


1C:\Windows\System32\*.*



17958b569565d7bd88d10c6f22d1c4063 # root flag