Try Hackme Advent of Cyber Day1 to Day6 Walkthrough

Try Hackme Advent of Cyber Day1 to Day6 Walkthrough

So this is a website where you can get man challenges and box that you can root to improve your knowledge. Today I am going to solve the Advent_Of_Cyber the 25 days challenge for complete beginners The link is given below https://tryhackme.com/dashboard

Day 1(Task 6)

So we are given with a login website and we have to register on it using any credentials you want

After loggin in we have the following screen inspecting the cookies on the website we have the following results

we have an cookie authid and it seems to be urlencoded and base64 encoded

On decoding it we have authid=ghi########## here the hidden part show the constant part of cookie

so now we change the user to mcinventory and forge the cookie and inject it into the browser authid=mcinventory##########

so now we have the answers for Task 6

Day2(Task 7)

Now we are give a url and we have to find the hidden directries at the given url using gobuster for the job

gobuster -u http://<ur-machine-ip>:3000 -w /usr/share/dirb/common.txt

now on to the directory we get a admin login page looking at the source we have

searching for the repository on github

now entering the default creds

And We have successfully completed the task :)

Day3(Task 8)

This is a forensics challenge we have to basically just answer the questions on the site by looking at the pcap file

For ques 1

###for ques 2

###for ques 3 we have to save the hash found in the output above and crack the hash with hashcat using rockyou.txt as given in the hint

One more Day complete :)

Day4(Task 9)

This task is about basic understanding of linux and moving around in linux

ques 1

to see number of visible files serioulsy :(

ques 2

use cat to see the contest EzPz

ques 3

grep -r password

using the command about the grep recursively this help us save time rather that perform grep on each file

ques 4

grep -r '[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}'

here using a regex string we can easily carve out the IP address

ques 5

cat /etc/passwd |grep /bin/bash

using this we can see how many users have shell access to the machine

ques 6

sha1sum file8

using the sha1sum command to get the hash

ques 7

Since we don’t have permissions to read /etc/shadow file so we find other files having string shadow in it and to which we have permission to read

find / -name "*shadow*" 2>/dev/null

we get an interesting shadow.bak file which we can so reading it we find the mcsysadmin’s password hash

Day5(Task 10)

This is standard OSINT introductory challenge

we are given with an jpeg image running exiftool on it gets us the username as the creator tag in exiftool output

Now using any osint username finder try to find the link to username accounts

We got the username

Lets checkout the twitter account with the found username

We get the answers to the first three questions :)

now lets go to the wordpress site linked in the description

There was a mention of wayback machine in the hints section lets look at the results of wayback machine

lets check the oldest snapshot of the website we get the answers to other to question by viewing the oldest version of this website

Day6(Task 11)

We are given a pcap file and asked some questions about the data in the pcap

ques 1

here on following through the udp streams we get a a string that seems to encoded so we decode it to get the answer

ques 2

Looking through the http request we see that there is a zip file and a jpeg image so we export them from wireshark

We can use steghide with empty password to get the data from jpeg file

steghide extract -sf TryHackMe.jpeg

ques 3

we can use John to crack the password of zip file

zip2john christmaslists.zip > hash
john hash
Share: Twitter Facebook
Nirmit Shah's Picture

About Nirmit Shah

Nirmit is a programmer, noob-hacker, a member of Cyberlabs, IIT (ISM) Dhanbad.

Pune, India

Comments