Black Box Test #1
You have been engaged in a Black-box Penetration Test (172.16.64.0/24 range). Your goal is to read the flag file on each machine.
Prework
Connect to VPN
Scan network
Scanner
Generated on Sun Jul 11 13:40:33 2021 with
nmap 7.91
.
Hosts Alive (4)
Host | OS | Accuracy |
---|---|---|
172.16.64.101 | Linux 3.12 | 95% |
172.16.64.140 | Linux 3.12 | 95% |
172.16.64.182 | Linux 3.12 | 95% |
172.16.64.199 | Microsoft Windows 10 | 96% |
Open Ports and Running Services
✔️172.16.64.101 (Linux 3.12 - 95%)
Port | State | Service | Version |
---|---|---|---|
22/tcp | open | ssh | OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 |
8080/tcp | open | http | Apache Tomcat/Coyote JSP engine 1.1 |
9080/tcp | open | http | Apache Tomcat/Coyote JSP engine 1.1 |
59919/tcp | open | http | Apache httpd 2.4.18 |
Target URL: http://172.16.64.101:8080
File Extension: *
File with list of dirs/files: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
Trying to access unsuccessfully for a couple of times will get you redirected to http://172.16.64.101:8080/manager/html, where the following information is shown:
http://172.16.64.101:8080/manager/html **** allows you to upload a war file.
Flag encountered!
✔️172.16.64.140 (Linux 3.12 - 95%)
Port | State | Service | Version |
---|---|---|---|
80/tcp | open | http | Apache httpd 2.4.18 |
Target URL: http://172.16.64.140
File Extension: *
File with list of dirs/files: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
Found potential relevant information at http://172.16.64.140/project!
However, such information is protected under basic authentication.
Discovered credentials to access http://172.16.64.140/project through `wfuzz`!
**** http://172.16.64.140/project **** is accessible through basic authentication with
admin:admin
credentials, as301
status code is a redirection.
Let's run dirbuster
again against the new scope.
Target URL: http://172.16.64.140/project
Use HTTP Authentication
Username: admin
Password: admin
File Extension: *
File with list of dirs/files: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt
Found relevant info!
On this url we find the following connection parameters for a SQL database server: http://172.16.64.140:80/project/backup/test/sdadas.txt:
Flag encountered!
Under http://172.16.64.140/project/354253425234234/flag.txt we find the following content:
✔️172.16.64.182 (Linux 3.12 - 95%)
Port | State | Service | Version |
---|---|---|---|
22/tcp | open | ssh | OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 |
The credentials we discovered while exploring 172.16.64.199 (Windows machine) do work!
Flag encountered!
✔️172.16.64.199 (Microsoft Windows 10 - 96%)
Port | State | Service | Version |
---|---|---|---|
135/tcp | open | msrpc | Microsoft Windows RPC |
139/tcp | open | netbios-ssn | Microsoft Windows netbios-ssn |
445/tcp | open | microsoft-ds | |
1433/tcp | open | ms-sql-s | Microsoft SQL Server 2014 12.00.2000.00; RTM |
49664/tcp | open | msrpc | Microsoft Windows RPC |
49665/tcp | open | msrpc | Microsoft Windows RPC |
49666/tcp | open | msrpc | Microsoft Windows RPC |
49667/tcp | open | msrpc | Microsoft Windows RPC |
49668/tcp | open | msrpc | Microsoft Windows RPC |
49669/tcp | open | msrpc | Microsoft Windows RPC |
49670/tcp | open | msrpc | Microsoft Windows RPC |
49943/tcp | open | ms-sql-s | Microsoft SQL Server 2014 12.00.2000 |
Flag encountered!
ssh://developer:dF3334slKw@172.16.64.182:22
seems like a ssh connection string in a `id_rsa.pub` file
Last updated