Fowsniff CTF
url:- https://tryhackme.com/room/ctf
Introduction
Hi Hackers,
In this article, we are going to deal with the boot2root challenge box. This is for beginner level.
Task 1 :- Hack into the FowSniff organisation.
- Deploy the machine. On the top right of this you will see a Deploy button. Click on this to deploy the machine into the cloud. Wait a minute for it to become live.
- Using nmap, scan this machine. What ports are open?
We will start with Enumeration, to check for the open ports
#nmap -sS -sV -O 10.10.134.90
3. Using the information from the open ports. Look around. What can you find?
Since, port 80 is open, we will check with web server
4.Using Google, can you find any public information about them?
I got this information about fowsniff crop after searching in Google.
In the comment session, i got pastebin
5.Can you decode these md5 hashes? You can even use sites like hashkiller to decode them.
6.Using the usernames and passwords you captured, can you use metasploit to brute force the pop3 login?
We will decode the hashes using md5.
By decoding we got to know for the user stone, there is no password
7.What was seina’s password to the email service?
Instead of Brute forcing, in a simple way we decoded the md5 hash of seina user to get the password.
8. Can you connect to the pop3 service with her credentials? What email information can you gather?
We can log in to POP3 server with the credentials of seina using telnet or netcat
Here, we are using netcat
#nc 10.10.134.90 110
We got 2 messages . We will retrieve it
#retr 1
While retrieving the first message we got the temporary password
While retrieving the second message we got the user name “baksteen”
#retr 2
9.In the email, who send it? Using the password from the previous question and the senders username, connect to the machine using SSH.
We will connect to ssh login to get user flag from the credentials we observed
10.Once connected, what groups does this user belong to? Are there any interesting files that can be run by that group?
11.Now you have found a file that can be edited by the group, can you edit it to include a reverse shell?
Instead of using reverse shell, i downloaded exploit , we will try to get root shell using exploit
Once, we got user shell, we will find the host name of the machine
#uname -a
Here, we got Linux 4.4.0–116-generic
We will search in the internet to find any information
We found an exploit, we will download it
The downloaded exploit is in .c format. So, we are compiling it into gcc
We will get the compiled exploit from kali to user
start python server in the location of the compiled exploit
Then in user shell,get the exploit
Once we get the exploit file, give the full permission to the file & execute
We got root shell
Change the directory & cat the root flag
Hope you enjoyed this blog. Happy Learning!!!