Posts Anthem
Post
Cancel

Anthem

Description

Exploit a Windows machine in this beginner level challenge.

RoomAnthem
OSWindows
DifficultyEasy
CreatorChevalier

Deploy the machine and quickly scan the ports with rustscan,

1
rustscan -a 10.10.235.249

image

we get 2 open port. Lets scan this using nmap,

1
nmap -sV -sC -p80,3389 10.10.235.249 -oN nmap.txt

image

Result scan reveals that port 80 is running Microsoft IIS Server and port 3389 is running rdp service. From results, we can conclude that this is a windows box. Let’s enumerate port 80.

Visit http://10.10.235.249,

image

we got a blog website. Seems like this is the hiring platform.

Enumerating it a bit, I found a poem which was posted by administrator but we can not find their name. So copy the poem and paste this on google to find out the name of the Administrator,

image

Solomon Grundy and email is sg@anthem.com.

Now, we have find out the username and email of administrator, maybe we can find out the login page where we can utilize these credentials to get into website.

We will use dirsearch to find hidden directories,

1
dirsearch -u http://10.10.235.249 -w /usr/share/seclists/Discovery/Web-Content/common.txt -i 200,301 2>/dev/null

and we get a file name robots.txt which is super interesting to look for. Visit http://10.10.235.249/robots.txt,

image

we can many hidden directories here, and also maybe the password!

Visiting http://10.10.235.249/umbraco, we are directed to its login page,

image

we can use administrator credentials to login,

image

This is a website which is monitored by administrator.

Now, since we have to find the flags (which are part of task), we can download the whole website using wget command with –recursive switch,

1
2
3
wget --recursive http://10.10.235.249
cd 10.10.235.249
grep -R "THM"  #(finding string which contains THM substring in whole directory)

and there we got our flags,

1
2
3
4
./authors/jane-doe/index.html:        <input type="text" name="term" placeholder="Search... THM{********}" />
./authors/jane-doe/index.html:                <p>Website: <a href="THM{***********}">THM{L0L_WH0_D15}</a>
./archive/a-cheers-to-our-it-department/index.html:<meta content="THM{************}" property="og:description" />
./archive/we-are-hiring/index.html:<meta content="THM{*****************}" property="og:description" />

We can use credentials, SG:***************** to rdp into machine,

image

on the desktop, we find our user flag.

Now, it is the time for privilege escalation.

Now, after enumerating, I found that we have to find a way to get hands on administrator password. So after navigating to C drive, there is a directory named backup which is hidden, contain sensitive file,

image

Getting inside of this directory, we can see a text file,

image

We can open this file,

image

but we got permission error because we are not administrator user.

But, we can do one thing, change this file security permission by adding SG user in administrators group,

image

After editing the file permission, we can see our user has been added,

image

Now, open the file and we can now read the content,

image

we got the password.

Now, open up the powershell as administrator user and it will prompt us the password,

image

after providing password, we get the administrator access.

Navigating to root directory and listing directory content,

image

we got our root flag.

This post is licensed under CC BY 4.0 by the author.