Black Box Test #1
You have been engaged in a Black-box Penetration Test (172.16.64.0/24 range). Your goal is to read the flag file on each machine.
Prework
Connect to VPN
Scan network
Scanner
Generated on Sun Jul 11 13:40:33 2021 with
nmap 7.91
.
Hosts Alive (4)
172.16.64.101
Linux 3.12
95%
172.16.64.140
Linux 3.12
95%
172.16.64.182
Linux 3.12
95%
172.16.64.199
Microsoft Windows 10
96%
Open Ports and Running Services
✔️172.16.64.101 (Linux 3.12 - 95%)
22/tcp
open
ssh
OpenSSH 7.2p2 Ubuntu 4ubuntu2.8
8080/tcp
open
http
Apache Tomcat/Coyote JSP engine 1.1
9080/tcp
open
http
Apache Tomcat/Coyote JSP engine 1.1
59919/tcp
open
http
Apache httpd 2.4.18
Target URL: http://172.16.64.101:8080
File Extension: *
File with list of dirs/files: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
Trying to access unsuccessfully for a couple of times will get you redirected to http://172.16.64.101:8080/manager/html, where the following information is shown:
http://172.16.64.101:8080/manager/html **** allows you to upload a war file.
Flag encountered!
✔️172.16.64.140 (Linux 3.12 - 95%)
80/tcp
open
http
Apache httpd 2.4.18
Target URL: http://172.16.64.140
File Extension: *
File with list of dirs/files: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
Found potential relevant information at http://172.16.64.140/project!
However, such information is protected under basic authentication.
Discovered credentials to access http://172.16.64.140/project through `wfuzz`!
**** http://172.16.64.140/project **** is accessible through basic authentication with
admin:admin
credentials, as301
status code is a redirection.
Let's run dirbuster
again against the new scope.
Target URL: http://172.16.64.140/project
Use HTTP Authentication
Username: admin
Password: admin
File Extension: *
File with list of dirs/files: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
Found relevant info!
On this url we find the following connection parameters for a SQL database server: http://172.16.64.140:80/project/backup/test/sdadas.txt:
Flag encountered!
Under http://172.16.64.140/project/354253425234234/flag.txt we find the following content:
✔️172.16.64.182 (Linux 3.12 - 95%)
22/tcp
open
ssh
OpenSSH 7.2p2 Ubuntu 4ubuntu2.8
The credentials we discovered while exploring 172.16.64.199 (Windows machine) do work!
Flag encountered!
✔️172.16.64.199 (Microsoft Windows 10 - 96%)
135/tcp
open
msrpc
Microsoft Windows RPC
139/tcp
open
netbios-ssn
Microsoft Windows netbios-ssn
445/tcp
open
microsoft-ds
1433/tcp
open
ms-sql-s
Microsoft SQL Server 2014 12.00.2000.00; RTM
49664/tcp
open
msrpc
Microsoft Windows RPC
49665/tcp
open
msrpc
Microsoft Windows RPC
49666/tcp
open
msrpc
Microsoft Windows RPC
49667/tcp
open
msrpc
Microsoft Windows RPC
49668/tcp
open
msrpc
Microsoft Windows RPC
49669/tcp
open
msrpc
Microsoft Windows RPC
49670/tcp
open
msrpc
Microsoft Windows RPC
49943/tcp
open
ms-sql-s
Microsoft SQL Server 2014 12.00.2000
Flag encountered!
ssh://developer:dF3334slKw@172.16.64.182:22
seems like a ssh connection string in a `id_rsa.pub` file
Last updated