Skip to content

Commit 21836bc

Browse files
committed
Merge branch 'main' of github.com:edoardottt/tryhackme-ctf
2 parents 8b5c719 + d414ecb commit 21836bc

File tree

5 files changed

+32
-32
lines changed
  • Advent-of-Cyber-2021

5 files changed

+32
-32
lines changed

Advent-of-Cyber-2021/Day-06-Patch_Management_Is_Hard/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,10 @@ Now that you read the index.php, there is a login credential PHP file's path. Us
2121

2222
- `**************************`
2323

24-
The web application logs all users' requests, and only authorized users can read the log file. Use the LFI to gain RCE via the log file page. What is the hostname of the webserver? The log file location is at ./includes/logs/app_access.log.
24+
- The web application logs all users' requests, and only authorized users can read the log file. Use the LFI to gain RCE via the log file page. What is the hostname of the webserver? The log file location is at ./includes/logs/app_access.log.
2525

2626
- `**************************************`
2727

28-
Bonus: The current PHP configuration stores the PHP session files in /tmp. Use the LFI to call the PHP session file to get your PHP code executed.
28+
- Bonus: The current PHP configuration stores the PHP session files in /tmp. Use the LFI to call the PHP session file to get your PHP code executed.
2929

30-
No answer needed
30+
No answer needed

Advent-of-Cyber-2021/Day-07-Migration_Without_Security/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,18 @@
22

33
- Interact with the MongoDB server to find the flag. What is the flag?
44

5-
- `***{********************************}`
5+
- `***{********************************}`
66

77
We discussed how to bypass login pages as an admin. Can you log into the application that Grinch Enterprise controls as admin and retrieve the flag?
88

99
Use the knowledge given in AoC3 day 4 to setup and run Burp Suite proxy to intercept the HTTP request for the login page. Then modify the POST parameter.
1010

11-
- `***{********************************}`
11+
- `***{********************************}`
1212

1313
- Once you are logged in, use the gift search page to list all usernames that have guest roles. What is the flag?
1414

15-
- `***{********************************}`
15+
- `***{********************************}`
1616

1717
- Use the gift search page to perform NoSQL injection and retrieve the mcskidy record. What is the details record?
1818

19-
- `*************************************`
19+
- `*************************************`

Advent-of-Cyber-2021/Day-08-Santas_Bag_of_Toys/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,17 @@ Open the first transcription log. You can see the commands and output for everyt
1515

1616
- What operating system is Santa's laptop running ("OS Name")?
1717

18-
- `********* ******* ** ***`
18+
- `********* ******* ** ***`
1919

2020
Review each transcription log to get an idea for what activity was performed on the laptop just after it went missing. In the "second" transcription log, it seems as if the perpetrator created a backdoor user account!
2121

2222
- What was the password set for the new "backdoor" account?
2323

24-
- `********************`
24+
- `********************`
2525

2626
- In one of the transcription logs, the bad actor interacts with the target under the new backdoor user account, and copies a unique file to the Desktop. Before it is copied to the Desktop, what is the full path of the original file?
2727

28-
- `*:*****************************************************.***`
28+
- `*:*****************************************************.***`
2929

3030
The actor uses a Living Off The Land binary (LOLbin) to encode this file, and then verifies it succeeded by viewing the output file. What is the name of this LOLbin?
3131

@@ -39,21 +39,21 @@ Under the Desktop folder, there seems to be a suspicious folder named "SantaRat"
3939

4040
- Drill down into the folders and see if you can find anything that might indicate how we could better track down what this SantaRat really is. What specific folder name clues us in that this might be publicly accessible software hosted on a code-sharing platform?
4141

42-
- `******`
42+
- `******`
4343

4444
Additionally, there is a unique folder named "Bag of Toys" on the Desktop! This must be where Santa prepares his collection of toys, and this is certainly sensitive data that the actor could have compromised. What is the name of the file found in this folder?
4545

4646
- What is the name of the user that owns the SantaRat repository?
4747

48-
- `**********`
48+
- `**********`
4949

5050
- Explore the other repositories that this user owns. What is the name of the repository that seems especially pertinent to our investigation?
5151

52-
- `*********************`
52+
- `*********************`
5353

5454
- Read the information presented in this repository. It seems as if the actor has, in fact, compromised and tampered with Santa's bag of toys! You can review the activity in the transcription logs. It looks as if the actor installed a special utility to collect and eventually exfiltrate the bag of toys. What is the name of the executable that installed a unique utility the actor used to collect the bag of toys?
5555

56-
- `*****************.***`
56+
- `*****************.***`
5757

5858
In the last transcription log, you can see the activity that this actor used to tamper with Santa's bag of toys! It looks as if they collected the original contents with a UHA archive. A UHA archive is similar to a ZIP or RAR archive, but faster and with better compression rates. It is very rare to see, but it looks the Grinch Enterprises are pulling out all the tricks!
5959

@@ -66,7 +66,7 @@ We know that the actor seemingly collected the original bag of toys. Maybe there
6666

6767
- What is the password to the original bag_of_toys.uha archive? (You do not need to perform any password-cracking or bruteforce attempts)
6868

69-
- `***************************`
69+
- `***************************`
7070

7171
McSkidy was able to download and save a copy of the bag_of_toys.uha archive, and you have it accessible on the Desktop of the Windows analysis machine. After uncovering the password from the actor's GitHub repository, you have everything you need to restore Santa's original bag of toys!!
7272

@@ -76,4 +76,4 @@ With that, you have successfully recovered the original contents of Santa's Bag
7676

7777
- How many original files were present in Santa's Bag of Toys?
7878

79-
- `***`
79+
- `***`

Advent-of-Cyber-2021/Day-09-Where_Is_All_This_Data_Going/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,28 +2,28 @@
22

33
- In the HTTP #1 - GET requests section, which directory is found on the web server?
44

5-
- `*****`
5+
- `*****`
66

77
- What is the username and password used in the login page in the HTTP #2 - POST section?
88

9-
- `*******************`
9+
- `*******************`
1010

1111
- What is the User-Agent's name that has been sent in HTTP #2 - POST section?
1212

13-
- `***************************************`
13+
- `***************************************`
1414

1515
- In the DNS section, there is a TXT DNS query. What is the flag in the message of that DNS query?
1616

17-
- `*******************************`
17+
- `*******************************`
1818

1919
- In the FTP section, what is the FTP login password?
2020

21-
- `**********`
21+
- `**********`
2222

2323
- In the FTP section, what is the FTP command used to upload the secret.txt file?
2424

25-
- `****`
25+
- `****`
2626

2727
- In the FTP section, what is the content of the secret.txt file?
2828

29-
- `*********`
29+
- `*********`

Advent-of-Cyber-2021/Day-10-Offensive_Is_The_Best_Defence/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,36 +2,36 @@
22

33
- Help McSkidy and run nmap -sT MACHINE_IP. How many ports are open between 1 and 100?
44

5-
- `*`
5+
- `*`
66

77
- What is the smallest port number that is open?
88

9-
- `**`
9+
- `**`
1010

1111
- What is the service related to the highest port number you found in the first question?
1212

13-
- `****`
13+
- `****`
1414

1515
- Now run nmap -sS MACHINE_IP. Did you get the same results? (Y/N)
1616

17-
- `*`
17+
- `*`
1818

1919
- If you want Nmap to detect the version info of the services installed, you can use nmap -sV MACHINE_IP. What is the version number of the web server?
2020

21-
- `*****************`
21+
- `*****************`
2222

2323
- By checking the vulnerabilities related to the installed web server, you learn that there is a critical vulnerability that allows path traversal and remote code execution. Now you can tell McSkidy that Grinch Enterprises used this vulnerability. What is the CVE number of the vulnerability that was solved in version 2.4.51?
2424

25-
- `**************`
25+
- `**************`
2626

2727
- You are putting the pieces together and have a good idea of how your web server was exploited. McSkidy is suspicious that the attacker might have installed a backdoor. She asks you to check if there is some service listening on an uncommon port, i.e. outside the 1000 common ports that Nmap scans by default. She explains that adding -p1-65535 or -p- will scan all 65,535 TCP ports instead of only scanning the 1000 most common ports. What is the port number that appeared in the results now?
2828

29-
- `*****`
29+
- `*****`
3030

3131
- What is the name of the program listening on the newly discovered port?
3232

33-
- `*******`
33+
- `*******`
3434

3535
If you would like to learn more about the topics covered in today’s tasks, we recommend checking out the Network Security module.
3636

37-
No answer needed
37+
No answer needed

0 commit comments

Comments
 (0)