Writeup: Advent of Cyber 4 Day 9 - AtomicMaya/knowledge-base GitHub Wiki

Advent of Cyber 4 - Day 9

Link: Advent Of Cyber 4 on TryHackMe

Question 1

Deploy the attached VM, and wait a few minutes. What ports are open?

Run nmap -sV -sS $IP

Answer: 80

Question 2

What framework is the web application developed with?

Browse to the page.

Answer: CVE-2021-3129

Question 3

What CVE is the application vulnerable to?

We search for laravel and use the info term to get the details of the CVE.

Answer: CVE-2021-3129

Question 4

What command can be used to upgrade the last opened session to a Meterpreter session?

From the explanation we find:

Answer: sessions -u -1

Question 5

What file indicates a session has been opened within a Docker container?

From the internet: /.dockerenv

Answer: /.dockerenv

Question 6

What file often contains useful credentials for web applications?

See (Question 4)

Answer: .env

Question 7

What database table contains useful credentials?

We find the table schema dump, there is a table called users:

Answer: users

Question 8

What is Santa's password?

Answer: p4$$w0rd

Question 9

What ports are open on the host machine?

We run proxychains -q nmap -n -sT -Pn -p 22,80,443,5432 172.17.0.1:

Answer: 22,80

Question 10

What is the root flag?

We login with the credentials and get the root flag:

Answer: THM{47C61A0FA8738BA77308A8A600F88E4B}