Game Zone

This is my write-up for the TryHackMe machine at: https://tryhackme.com/room/gamezone.

Deploy the vulnerable machine

The hint for the first question is Reverse Image Search. I then posted the picture in Yandex.com and got the following:

I then clicked on an image and it led me to a title: Hitman Absolution. I then Google-d the character name, and got the answer:

What is the name of the large cartoon avatar holding a sniper on the forum? Agent 47

Obtain access via SQLi

I then ran an nmap scan:

nmap -T4 -A 10.10.72.202 -oN nmap_scan.txt

I got the following output:

Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-27 16:30 EDT
Nmap scan report for 10.10.72.202
Host is up (0.20s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 61:ea:89:f1:d4:a7:dc:a5:50:f7:6d:89:c3:af:0b:03 (RSA)
|   256 b3:7d:72:46:1e:d3:41:b6:6a:91:15:16:c9:4a:a5:fa (ECDSA)
|_  256 53:67:09:dc:ff:fb:3a:3e:fb:fe:cf:d8:6d:41:27:ab (ED25519)
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Game Zone
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.05 seconds

I noticed that there were only 2 ports open: 22 and 80. I went on port 80 to see what the website is:

After entering in ' or 1=1 -- - in the username portion and left the password field empty (based on the recommendations of the THM room creator). I was in then:

When you've logged in, what page do you get redirected to? portal.php

Using SQLMap

For this one, we have to intercept the request to get the format for the SQLMap usage later. I turned on Burpsuite, and then got the request:

I then saved this to a file:

I then ran the command the room recommended:

sqlmap -r sqlmap_output.txt --dbms=mysql --dump

I then got the following output:

In the users table, what is the hashed password? ab**********************************

What was the username associated with the hashed password? agent47

What was the other table name? post

Cracking a password with JohnTheRipper

For this one, I went with Hashcat, just because I am more comfortable with hashcat. I ran the following command:

hashcat -m 1400 ab5db915fc9cea6c78df88106c6500c57f2b52901ca6c0c6218f04122c3efd14 rockyou.txt

The rockyou.txt file is default in Kali, and it is located at /usr/share/wordlist. I copied it to the local directory, ran gunzip on it, and got the file. As for the hashcat hash crack run, I got the following output:

What is the de-hashed password? vi**********

I ran ssh agent47@10.10.72.202 and used the password I had received before, and got into the machine:

I then got the user.txt flag:

What is the user flag? 649**********************

Exposing serviced with reverse SSH tunnels

How many TCP sockets are running? 5

I then ran the following command, based on the recomendation from the machine:

ssh -L 10000:localhost:10000 agent47@10.10.72.202

I then posted the password that I had gotten previously into the password for the SSH, and got in again:

This time, we have the webapp running on our localhost:

What is the name of the exposed CMS? Webmin

The login credentials for the webapp were the same credentials from previously, this leads to this site:

What is the CMS version? 1.580

Privilege Escalation with Metasploit

I searched on msfconsole for an exploit:

I then started filling in options, and ended up with this:

I realized that the RHOST was supposed to be set to 127.0.0.1, based on this writeup. When I changed that option in msfconsole, I was then able to get the exploit to work. I then got the flag:

What is the root flag? a4************************************

Last updated