Tryhackme blaster walkthrough !!

 

Image for post
Blaster walkthrough -Tryhackme by Akshay kerkar

Youtube walkthrough:-



So first we did a Nmap scan to know the open ports.

Starting Nmap 7.80 ( https://nmap.org ) at 2020–06–03 06:13 UTC
Stats: 0:00:02 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 0.50% done
Nmap scan report for 10.10.134.156
Host is up (0.18s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: IIS Windows Server
3389/tcp open ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info:
| Target_Name: RETROWEB
| NetBIOS_Domain_Name: RETROWEB
| NetBIOS_Computer_Name: RETROWEB
| DNS_Domain_Name: RetroWeb
| DNS_Computer_Name: RetroWeb
| Product_Version: 10.0.14393
|_ System_Time: 2020–06–03T06:14:07+00:00
| ssl-cert: Subject: commonName=RetroWeb
| Not valid before: 2020–05–21T21:44:38
|_Not valid after: 2020–11–20T21:44:38
|_ssl-date: 2020–06–03T06:14:09+00:00; +5s from scanner time.
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2016 (89%), FreeBSD 6.X (85%)
OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:freebsd:freebsd:6.2
Aggressive OS guesses: Microsoft Windows Server 2016 (89%), FreeBSD 6.2-RELEASE (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 4s, deviation: 0s, median: 4s

TRACEROUTE (using port 3389/tcp)
HOP RTT ADDRESS
1 157.79 ms 10.9.0.1
2 165.12 ms 10.10.134.156

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 38.52 seconds

So we got two open ports port(80) port (3389) on port 80 Microsoft IIS is running and port 3389 microsoft terminal service is there which is a RDP service. so let’s check the webpage.

Image for post

So the title is Windows IIS Server we can use Gobuster to check for hidden directories.

Image for post

We got a directoy let’s check the directory

Image for post

The hidden directory webpage is showing some articles and the author name it can be a hint

Image for post

So we also got a another hint the first one might be a username and this must be the password so now we can try to log in through the RDP.

Image for post

from the username and password we have successfully logged in and we can see the user.txt file is present on the Desktop you can view the user.txt file and submit the user flag.

After checking the browser’s history we got some useful information.

Image for post

After searching on google about this we found that we can use this vulnerability to get root access if you want to know about this vulnerability you can visit this website

CVE-2019–1388 | Windows Certificate Dialog Elevation of Privilege Vulnerability

So now it’s time to esclate our privileges we can see that on Desktop we have a program so let’s run that program

Image for post
Image for post

So it’s asking for Administrator password let’s click on “Show information about the publisher’s certificate”

Image for post

And click on “VeriSign Commercial Software Publishers CA” after that Internet explorer will open.

Image for post

Click on “ Settings” “File” and click on “Save as”

Image for post

So you can see we are getting error click on “OK” and in the “File name” enter this command

C:\Windows\System32\*.*

Image for post

After search for “cmd” and open it.

Image for post
Image for post

Now we can read root flag.we know that our victim machine is running Windows Defender, let’s go ahead and try a different method of payload delivery we can use Metasploit module which will start a webserver and serves a payload so load the module and and give command “show targets” and set target to powershell and set “LHOST” and “LPORT” according to your Tryhackme connection.

Image for post

and set payload to reverse http

Image for post

and run the module as a job with this command “run -j”

Image for post

copy the exploit and paste the exploit on compromised machine to get a reverse connection.

Image for post

and press “enter” and check the attacker machine if we got a reverse connection or not

Image for post

And we got a meterpreter session opened.

Comments

  1. Tryhackme Blaster Walkthrough !! >>>>> Download Now

    >>>>> Download Full

    Tryhackme Blaster Walkthrough !! >>>>> Download LINK

    >>>>> Download Now

    Tryhackme Blaster Walkthrough !! >>>>> Download Full

    >>>>> Download LINK rx

    ReplyDelete

Post a Comment