Sitemap

MyBox

4 min readJul 11, 2021

Hi folks,

In this article, we are going to learn new topics & going to crack the difficulty level box.

Press enter or click to view image in full size

Deploy the machine

Press enter or click to view image in full size
Deploy

After connecting vpn, check connectivity.

Press enter or click to view image in full size
Connectibvity

Enumeration

As, we always know, the first step is to scan the open ports using nmap.

Here, we can see the port 22,111,2049 & 8082.

Press enter or click to view image in full size
Enumeration

As port 8082 is open, we will check with web-server

Press enter or click to view image in full size
Web-server

Here, we dont get any information. So we will check with the page-source

We got flag1

Press enter or click to view image in full size
Page-source(Flag-1)

Since, there are no other information to proceed, we will decode the flag1 using “cyberchef”

By decoding it, we got the username & password.

Press enter or click to view image in full size
Cyberchef

Since, port 22 is open. We will try to login with ssh with the credentials we got.

We got user shell

Press enter or click to view image in full size
User-shell(toby)

We got 1 file & 1 directory in user login. We will check it one-by-one

In the examples.desktop file, we dont find any useful information.

So, lets check directory

Press enter or click to view image in full size
files in toby user

In FunnyThing directory we got a jpeg file.

Press enter or click to view image in full size
folder of toby user

Lets download it to our kali machine using python

Press enter or click to view image in full size
python

Open the thm machine ip in browser along with the port

Press enter or click to view image in full size
File

Download the file & check it as password using stegseek tool

It shows there is no password for the file. So, we will extract the content of jpeg file using steghide tool

We can see the extracted fils is saves as secret1.txt

Press enter or click to view image in full size
Stegnography tool

We will find the content of extracted file.

we got flag2.

Flag-2

Again we will decode it using “cyberchef”

We got another username & password

Press enter or click to view image in full size
Cyberchef

We will login again with ssh with the credentials we got from flag2

We got user shell

Press enter or click to view image in full size
Another user shll(arun)

We will check the directories of user “arun”

Here, we can see a folder called sudoers.

Press enter or click to view image in full size
Dirctorief of arun

We will check it

#cat /etc/sudoers

We got pwfeedback exploit, which is buffer overflow

Press enter or click to view image in full size
sudoes

Search it in google.

We got github for this exploit

Press enter or click to view image in full size
pwfeedback exploit

We will clone it in our kali

Press enter or click to view image in full size
git-clone

We got an exploit.c from the downloaded git

We will download it to user arun, by using python

Press enter or click to view image in full size
python

By using “wget” command we can get the file from kali to user arun

After downloading, compile the file using gcc

#gcc -o exploit exploit.c

We got root access

Press enter or click to view image in full size
Downloading exploit

As we didn’t find anything in root directory, we will check outside it

Press enter or click to view image in full size
root shell

We will check all the hidden files

Here, we can see .Finish file

Press enter or click to view image in full size
hidden files

We will check the content of the file

We got Flag3

Press enter or click to view image in full size
Flag-3
Press enter or click to view image in full size
Press enter or click to view image in full size

I believe you guys have learned new things from this article. I will see you in next article.

Happy Learning!!!!

--

--

Pavithra Santhosh
Pavithra Santhosh

Written by Pavithra Santhosh

This is Pavithra Santhosh, who is a aspiring Cyber security professional, Currently part of Red team certification programme from Hacker U.

No responses yet