René und IT-Sec

Mein Weg zur IT Sicherheit

Seite 2 von 9

TryHackMe WriteUp – Advent of Cyber 2022 – Day 9

https://tryhackme.com/room/adventofcyber4

Task 14 [Day 9] Pivoting Dock the halls

Frage 1:
Deploy the attached VM, and wait a few minutes. What ports are open?

Hier hilft uns ein nmap Scan:

└─$ nmap 10.10.109.8                 
Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-14 18:47 CET
Nmap scan report for 10.10.109.8
Host is up (0.047s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT   STATE SERVICE
80/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 0.83 seconds

Antwort 1:
80

Frage 2:
What framework is the web application developed with?

Port 80 ist offen, dieser zeigt eine http Seite an. Wir öffnen die SEite in unserem Browser (http://MACHINE_IP:80).

Hier sehen wir, dass Laravel benutzt wird.

Antwort 2:
Laravel

Weiterlesen

TryHackMe WriteUp – Advent of Cyber 2022 – Day 6

https://tryhackme.com/room/adventofcyber4

Task 11 [Day 6] Email Analysis It’s beginning to look a lot like phishing

Frage 1:
What is the email address of the sender?

Wir machen einen Rechtsklick auf den Desktop und wählen „Open Terminal“, dann geben wir unseren Befehl ein:

ubuntu@ip-10-10-136-88:~/Desktop$ emlAnalyzer -i Urgent:.eml --header --html -u --text --extract-all
 ==============
 ||  Header  ||
 ==============
X-Pm-Content-Encryption.....end-to-end
X-Pm-Origin.................internal
Subject.....................Urgent: Blue section is down. Switch to the load share plan!
From........................Chief Elf <chief.elf@santaclaus.thm>
Date........................Tue, 6 Dec 2022 00:00:01 +0000
Mime-Version................1.0
Content-Type................multipart/mixed;boundary=---------------------03edd9c682a0c8f60d54b9e4bb86659f
To..........................elves.all@santaclaus.thm <elves.all@santaclaus.thm>
X-Attached..................Division_of_labour-Load_share_plan.doc
Message-Id..................<QW9DMjAyMl9FbWFpbF9BbmFseXNpcw==>
X-Pm-Spamscore..............3
Received....................from mail.santaclaus.thm by mail.santaclaus.thm; Tue, 6 Dec 2022 00:00:01 +0000
X-Original-To...............elves.all@santaclaus.thm
Return-Path.................<murphy.evident@bandityeti.thm>
Delivered-To................elves.all@santaclaus.thm

 =========================
 ||  URLs in HTML part  ||
 =========================
[+] No URLs found in the html

 =================
 ||  Plaintext  ||
 =================
[+] Email contains no plaintext

 ============
 ||  HTML  ||
 ============
<span>Dear Elves,</span><div><br></div><div><span>Due to technical problems in the blue section of our toy factory, we are having difficulties preparing some toys. </span></div><div><br></div><div><span>There
 are a few days left to Christmas, so we need to use time efficiently to
 prepare every wishlist we receive. Due to that, the blue section's 
workload is shared with the rest to avoid any toy production delay.</span></div><div><br></div><div><span>The detailed division of labour is included in the attached document.</span></div><div><br></div><div><span>Good luck to you all.</span></div><div><br></div><div><b><span>Chief Elf</span></b></div><div><br></div>

 =============================
 ||  Attachment Extracting  ||
 =============================
[+] Attachment [1] "Division_of_labour-Load_share_plan.doc" extracted to eml_attachments/Division_of_labour-Load_share_plan.doc

Antwort 1:
chief.elf@santaclaus.thm

Weiterlesen

TryHackMe WriteUp – Skynet

https://tryhackme.com/room/skynet

Task 1 Deploy and compromise the vulnerable machine!

Frage 1:
What is Miles password for his emails?

Wir starten mit einem einfachen nmap Scan:

└─$ nmap 10.10.68.67    
Starting Nmap 7.93 ( https://nmap.org ) at 2022-11-17 17:59 CET
Nmap scan report for 10.10.68.67
Host is up (0.068s latency).
Not shown: 994 closed tcp ports (conn-refused)
PORT    STATE SERVICE
22/tcp  open  ssh
80/tcp  open  http
110/tcp open  pop3
139/tcp open  netbios-ssn
143/tcp open  imap
445/tcp open  microsoft-ds

Nmap done: 1 IP address (1 host up) scanned in 2.92 seconds

Wer hätte es gedacht, ein Emailservice ist vorhanden! Weiter geht es mit der Enumeration und SMBMap:

└─$ smbmap -H 10.10.68.67
[+] Guest session       IP: 10.10.68.67:445     Name: 10.10.68.67                                       
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        print$                                                  NO ACCESS       Printer Drivers
        anonymous                                               READ ONLY       Skynet Anonymous Share
        milesdyson                                              NO ACCESS       Miles Dyson Personal Share
        IPC$                                                    NO ACCESS       IPC Service (skynet server (Samba, Ubuntu))
Weiterlesen

TryHackMe WriteUp – Game Zone

https://tryhackme.com/room/gamezone

Task 1 Deploy the vulnerable machine

Frage 1:
What is the name of the large cartoon avatar holding a sniper on the forum?

Der Protagonist aus der Spiele-Serie Hitman!

Antwort 1:
Agent 47

Task 2 Obtain access via SQLi

Frage 1:
When you’ve logged in, what page do you get redirected to?

Wir öffnen die IP der Machine in unserem Browser und geben ‚ or 1=1 — – in das „Log in“ Feld ein und klicken auf „Enter“:

Weiterlesen

TryHackMe WriteUp – Alfred

https://tryhackme.com/room/alfred

Task 1 Initial Access

Frage 1:
How many ports are open? (TCP only)

Erster Schritt: nmap:

└─$ nmap 10.10.37.194                  
Starting Nmap 7.93 ( https://nmap.org ) at 2022-11-06 14:42 CET
Nmap scan report for 10.10.37.194
Host is up (0.048s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT     STATE SERVICE
80/tcp   open  http
3389/tcp open  ms-wbt-server
8080/tcp open  http-proxy

Nmap done: 1 IP address (1 host up) scanned in 4.85 seconds

Antwort 1:
3

Weiterlesen
« Ältere Beiträge Neuere Beiträge »

© 2025 René und IT-Sec

Theme von Anders NorénHoch ↑