Game Zone

Room Link: https://tryhackme.com/room/gamezonearrow-up-right

Obtain access via SQLi

Username field was vulnerable to SQLi,

Username: ' or 1=1 -- -
Password: anything

Using SQLMap

I setup burp to intercept requests and then tried searching for something on the portal page

Saved the request into a file called request.txt, if you highlight everything and right click you can copy to file

In the users table, what is the hashed password?

ab5db915fc9cea6c78df88106c6500c57f2b52901ca6c0c6218f04122c3efd14

What was the username associated with the hashed password?

agent47

What was the other table name?

post

Cracking a password with JohnTheRipper

Used the following site to idenfitfy what the hash type was. It identified that it is SHA2-256.

Hash Analyzer: https://www.tunnelsup.com/hash-analyzer/arrow-up-right

What is the de-hashed password?

john was able to crack the hash ehich gave us the password videogamer124.

Now you have a password and username. Try SSH'ing onto the machine. What is the user flag?

Exposing services with reverse SSH tunnels

How many TCP sockets are running?

What is the name of the exposed CMS?

What is the CMS version?

I was able to login with the previous credentials found and find the CMS version.

Privilege Escalation with Metasploit

Last updated