Try Hackme Advent of Cyber Day7 to Day12 Walkthrough
So this is the continuation to the Advent_of_Cyber 25 part Series on https://tryhackme.com
Day7(Task 12)
here we have to do a nmap scan on the given ip and answer some question based on the scan results So_Ezzzz
I used the following command
nmap -v -sT -A 10.10.231.143
some part of the log results are given below
we see a http server on port 999 we access it on our browser to get the answer to the last question
Day8(Task 13)
So I have to find the port on which ssh is running on so I use the following command
nmap -v -p- --min-parallelism 100 10.10.159.75
we get the port 65534 open and further scan reveals that it is running ssh
lets ssh into it we now use the following command to find SUID file with user root as the name of the challenge suggest we use the command
find / -user root -perm -4000 -print 2>/dev/null
now the system-control binary looks interesting,on checking it out we find that it executes any command we supply as root so we can get both the flags using this binary
hackerman!!!
Day9(Task 14)
This is a simple scripting task we just have to write a script to find the value by using requests and json module in python
import requests
import json
path="f"
host="http://10.10.241.214:3000/"
value=""
while 1==1:
response=requests.get(host+path)
# print(response.text)
json_data=json.loads(response.text)
path=json_data["next"]
if path=="end":
break
value=value+json_data["value"]
# print(value)
print(value)
On running the script we get the flag
Day10(Task 15)
So this is basically intro to the metasploit framework
lets start by basic nmap scans
now running nikto to find the vulnerablity in the web server
so we got a strut vulnerablity from nikto lets search for it in msfconsole
configuring the exploit in the msfconsole and running it
now finding the flag using basic regex
and ssh pass from bash_history
now logging into ssh using the credentials and finding the asked info
Day11(Task 16)
This Challenge introduces us to the basic file transfer and database service First of lets nmap scan the ip
Task 1
Here we have to read creds.txt from nfs of the server
Task 2
Here we login using creds as anonymous:anonymous and get the desired file
Task 3
Now login in to mysql database using the credentials found and look for useful data
The task is Done :)))
Day12(Task 17)
So in this challenge we are given a zip file, on unzipping it we find the following
ques 1
we need to find the md5sum of note1 file which can be done easily in the terminal :smile:
ques 2
we need to decrypt the gpg file and we are given the passphrase as 25daysofchristmas
ques 3
we need to decrypt an encrypted text file using the given private rsa key here google comes to my rescue we need to use openssl rsautl
Comments