Skip to content

Latest commit

 

History

History
85 lines (69 loc) · 4.03 KB

GoldenEye.md

File metadata and controls

85 lines (69 loc) · 4.03 KB

Guided:

Task 1 - Intro & Enumeration

Q: Use nmap to scan the network for all ports. How many ports are open?

A: 4

(used nmap -p- , but didn't count the filtered ones)

Q: Who needs to make sure they update their default password? A: Boris

Opened Web-site on port 80, used Ctrl+U and saw a link to "terminal.js", The link reveals HTML enteties encode for user Boris default password. InvincibleHack3&#114

Q: Whats their password?
A: InvincibleHack3&#114

By decoding it online Here

Task 2 - It's mail time...

Q: If those creds don't seem to work, can you use another program to find other users and passwords? Maybe Hydra?Whats their new password?
A: secret1!

Used Telnet to connect to pop3 on port 55007, boris:InvincibleHack3&#114 didn't work, but at least I've got the username right, time for bruteforce.
hydra -l boris -P /usr/share/wordlists/fasttrack.txt <IP> pop3 -s 55007 -t 50

Q: Inspect port 55007, what services is configured to use this port?
A: Telnet

Q: What can you find on this service?
A: emails

Q: What user can break Boris' codes?
A: Natalya
Mentioned at web-site source and emails
hydra -l natalya -P /usr/share/wordlists/fasttrack.txt <IP> pop3 -s 55007 -t 50

Reveals natalya:bird
natalya's email reveals this:

username: xenia
password: RCP90rulez!

And if you didn't have the URL on outr internal Domain: severnaya-station.com/gnocertdir

GoldenEye Operators Training

Q: Try using the credentials you found earlier. Which user can you login as?
A: xenia

Q: Have a poke around the site. What other user can you find?
A: doak

Going to http://severnaya-station.com/gnocertdir with xenia's creds,
Go to My profile -> Messages reveals msg from Dr_doak
My email username is... doak

Q: What was this users password?
A: goat hydra -l doak -P /usr/share/wordlists/fasttrack.txt <IP> pop3 -s 55007 -t 50

Q: What is the next user you can find from doak?
A: dr_doak

Reveals in he's email.

Q: What is this users password?
A: 4England!

Login as user doak, go to My profile -> My private files -> for james and download the file "s3cret.txt"
S3cret.txt reveals /dir007key/for-007.jpg , so i went to the full link -> http://severnaya-station.com/dir007key/for-007.jpg -> Download the .img and pass it on to extract meta-data Here
Exifdata reveals base64 hidden message eFdpbnRlcjE5OTV4IQ==
echo eFdpbnRlcjE5OTV4IQ== | base64 -d -> xWinter1995x!
It was web-site's admin password, admin:xWinter1995x!
Login as admin and THM hinted to look for "Aspell" plugin.
There was a search bar on the bottom-left side, searched for 'spell' and found "Spell engine" that should of be changed from 'Google Spell' to 'PSpellShell', and 'Path to aspell' changed to my reverse shell, (THM hinted it should be python one)
Pentestmonkey shells (python one)
Opened nc listener and got connection back as user www-data
THM suggested to download and transfer linuxprivchecker
Honestly they just wanted me to use uname -a
Q: Whats the kernel version?
A: 3.13.0-32-generic
THM said to use this Exploit
But the target machine didn't have "gcc" to compile it, but it had "cc" , All i had to do to tweak it correctly is to open the exploit and change from gcc -> cc
Upload to target, compile the exploit, use exploit... and...
id
uid=0(root) gid=0(root) groups=0(root),33(www-data)


>Get root's flag and open the last link in it -> http://severnaya-station.com/006-final/xvf7-flag/