TryHackMe | OhSINT

Another box down on TryHackMe! Now admittedly, this is a much more beginner-oriented box, but it is a great introduction to OSINT (Open-Source Intelligence). There were some cool challenges, but some of it I find out a little funky/cheesy (like the final question). But overall, it was a fun experience.

It starts off by giving us an image to download. So, unless the message is directly hidden in the picture itself, the next step would be to take a look at the EXIF/XMP info that is stored on this image. This can include info like the type of camera used to take the photo, the geo-location, the name of the author, and much more!

So what you end up needing to do, is you can either use your computer to use this data, or some type of tool that can display this EXIF/XMP data for us.

In the copyright for the photo, we can see the name “OWoodflint”. Since there isn’t much else popping out right now, let’s just plug it into Google.

And the top three results are exactly what we are looking for! I just pulled them all up right away to take a quick scan over them.

On his Twitter page we can see that the profile picture is of a cat, so that answers our first question. The next question is to see what city they live in.

Scrolling through the Twitter page, there is a BSSID for a network there. Since he mentions that his house is near this network and that he can access it, if we can find where this network is, we can find his rough location.

Online there are lots of different ways and tools to do this, but I chose Wiggle to check and see if it was recorded in their database. Wiggle is a war-driving program. When people are on the go, they can turn on Wiggle, and it will scan all of the WiFi networks around them, and upload the data that they grab to this service. By inputting his BSSID, I was able to track down the city that he was located in, along with the info for the next question, which was regarding what the SSID of the WAP he was connected to is.

Our next quest is to find his email address. We’ve bled his twitter page pretty dry, so let’s take a look at his GitHub page.

There you have it! Easy enough to find. This info answers the next question as well. Now we are going to attempt to find out where he went on Holiday. Since there is no other info on the GitHub page, we are going to go to the last resource we have; his WordPress site.

Aaaaaaaand it says it right there on the front page, easy-peasy. The final question was a little rougher, because so far in my exploration, I haven’t found this to be a useful thing to do when doing OSINT challenges, but it is included in here. It is to find his password.

This is why I thought it was a bit cheesy. Most of the time, you probably will not run into situations where the user has their password publicly posted, just slightly hidden/white text on a white background. Taking a look at the HTML we see:

That it is just a new paragraph on the post, the text has no color, and is just sitting there. Normally, we might be looking more towards password dumps/breaches to find old passwords for people, but I guess this works too!

Overall, a great beginner box, and a great one to do when you only have a little bit of time and still want some fun.

TryHackMe | Blue

So recently I started to try my hand at vulnerable boxes, and some of my friends recommended a website called “TryHackMe” because it’s a little nicer to beginners than some VulnHub/HackTheBox boxes are, so I decided to go for it! Here is a short overview of my journey exploiting this box.

If you have any questions, feel free to leave a comment. Some of my answers/explanations may not match up to the answers I gave on TryHackMe, and that is just because they expected a very linear approach and I accidentally went off and used an exploit that did basically the same thing, just in a different way.

So our first task is to scan the machine. TryHackMe gives you an IP, so I booted up Kali, started using ZenMap (yeah I know, I’m a pleb), and hit the machine with an intense scan. The only reason I started with the intense scan is because this is just a box challenge, a normal scenario would require a bit more finesse.

And as you can see outlined in red, I was able to find the three ports that are open that were under 1000.

So, since this box is based off of EternalBlue, and there is an nmap scan specifically for these vulnerabilities, I created a new custom ZenMap profile and did a custom scan looking for these vulnerabilities, plus a few other things.

Now, you can see that this box is definitely vulnerable to the vulnerabilities we were looking for.

In this pic, you can see what options are available in Metasploit to use to get into this box. I would recommend attempting this exploit in any other way than using Metasploit (just for the sake of experience), or at the very least, find a small script yourself (like a python one), study the script a bit, and then use it to exploit the box. The only reason I didn’t, was because I was racing a friend on this box.

Also, you’ll see that I set all of the options for Metasploit to exploit the box successfully.

Hitting “run”, and we’ve got a successful session on the machine, we will want to background this session, just to check a couple other things out real quick.

Running ifconfig, it comes back successfully identifying that we are on the machine now.

getsystem also identifies that we have Admin as well.

Starting a shell, and running whoami, shows that kind of system we are on, and what authority we have.

And we migrated our session to a different service ID on the system successfully. During this though, our process may or may not die, so we might need to restart it!

The three main reasons for migrating the process is:

  1. You have an unstable shell and might need to move to a more “robust” process.
  2. Some exploits require an interactive session (AKA not session 0).
  3. You need to migrate from a 32-bit process to a 64-bit operating system.

You can read more about process migration here.

Using hashdump, we can see that there are three users on the computer. We want into the “Jon” user account though, so we are going to grab that hash and try to crack it.

Luckily, the hash itself is pretty easy to crack using an online database, and we get the password, which is “alqfna22”.

And just as a side note, sites like crackstation don’t usually actively crack hashes for you. They just match the hash up to a preexisting one in their database and give you the result. So it’s a quick and easy way to do it if you don’t feel like actually going through the cracking process, and sometimes you get lucky and find matches.

Now we are on the hunt for flags. Using search search -f flag*.txt we were able to find all of the text files with the word “flag” on the box. The asterisk at the end before “.txt” is a wildcard, which is why flag1, flag2, and flag3 all showed up. All that’s really left is to traverse to those parts of the directory and see what’s inside those files.

This box was a great experience for a beginner like me, and I had a ton of fun working on it! It took me just barely under an hour, and was very short but sweet, and has encouraged me to continue to try out more boxes.

Thanks for giving this a read!

CyLance Smart Antivirus Bypass

Hey! I know it has been quite a while since I last posted, but this coronavirus stuff has been crazy! And aside from that, I haven’t had time to do anything crazy productive outside of my school. But a little extra time came across my hands and I found a great article written by a user called “Slaeryan” and had to post it, because I learned quite a few new things from it. In the article he talks about shellcoding, using metasploit, different attacks and how they might work, and much more. Click the link below to give it a read.

Click here

A Brief Overview of the Equifax Hack

The Equifax breach was one of the largest and impactful breaches of recent years, and I just wanted to take a quick look at it since I discovered that lawmakers had released a PDF report detailing exactly how they were hacked.

Among other things that this report highlights, it looks at how Equifax turned down help from the DHS, and instead went to a private third-party cyber-security company. This isn’t abnormal, but having more than one party check your security, especially when it’s the DHS, can’t hurt one bit.

Above you’ll see a chart that describes how Equifax was breached. Now, the main vulnerability that was used was known, and US-CERT had warned the public about it. For some small businesses, emergency patches like this may not come up for a little while due to negligence or just not knowing the warning had been posted. But when you’re a company as big as Equifax, handling the sensitive data that they have, there is no excuse for a vulnerability to be open in a company that long after they were warned. Something as critical as that should have been patched straight away.

Get this though, the Apache Struts vulnerability that was used was months-old. They knew about it, but just failed to fix it. Using the vulnerability, the attackers gained access to login credentials for three of their servers, and from there, using the same credentials (c’mon guys), they accessed another 48 servers. These servers contained the personal information that was affected.

From there, the attackers stole bits of data from 51 databases ever so slowly, as to not set off any red flags. This process took around 76 days. The breach wasn’t known about until July 29th, and the attackers had their access terminated on July 30th.

In more recent news, Equifax has spent over $200 million on cyber security, and has a newer CISO. The company is attempting to make sure a breach like the one they suffered never happens again. It’s never too late to dump money into cyber security for your company, but why wasn’t this done beforehand? Why weren’t the proper steps taken to ensure their critical infrastructure was secured?

The Justice Department has charged four members of the Chinese Military with the hack though, and it’s amazing that they were even able to come up with names. I, myself, am extremely interested in how they were able to track the culprits down. These attackers had access to the Social Security numbers, birth dates, and more, of about 145 million people. Of course, the Chinese Foreign Ministry is completely denying the charges.

Apparently officials have stated that these hackers covered their tracks by routing traffic through 34 servers in 20 countries to hide their location, and used encrypted channels to communicate, while wiping logs that they left behind. What I’m really looking forward to, is the in-depth forensic report of how they tracked these guys down. I’ve gone through the indictment fully, and it gives away some info, but not much. Especially when it comes to how the U.S. got the server logs/records off of a Taiwanese servers that they hackers almost definitely were cleaning constantly (maybe they weren’t?).

Sources: https://www.washingtonpost.com/national-security/justice-dept-charges-four-members-of-chinese-military-in-connection-with-2017-hack-at-equifax/2020/02/10/07a1f7be-4c13-11ea-bf44-f5043eb3918a_story.html

https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html

https://www.cnet.com/news/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed/

OverTheWire Bandit Walkthrough Levels 0 to 6

OverTheWire is a community run cyber-war zone, that can help users learn practice and learn the major concepts of different security scenarios through games. Currently, they offer 17 in total, but whether some are up or down depends on the day (they are almost always up though, the developers are very reliable).

Bandit is the first game that they recommend people to play, just to gauge where you’re at and help you relearn some of those Linux skills. Let’s start with Level 0 –> Level 1.

Level 0 —> Level 1

Really not too bad at all. The goal of this level was just to get you into the first server, and have you prepped for level one. In level one, you’ll be looking for a file stored in the home directory — it contains a password. Helpful reading:

Secure Shell (SSH)

How to Use SSH

And with a few quick commands, we’ve grabbed it! Now, ssh into the next level and use that long string of numbers that “readme” file gave you.

Level 1 —> Level 2

At this point, I’m going to stop posting screenshots of me ssh’ing in, because I don’t want to annoy you. In this level, you will need to open a file named “-“. When in doubt about a filename, use your slash!

And there ya have it!

Level 2 —> Level 3

Here they want you to open a file with spaces in it’s name. Not to rough, but for the uninformed they might have to do a little reading up on the resources provided on the site to further familiarize themselves with Bash scripting.

Helpful Reading:

Dashed Filename

Advanced Bash Scripting: Special Characters

Level 3 —> Level 4

The file you are looking for in this level is available in a hidden file, in the inhere directory. Make sure as you go through these levels, you also take a look at each commands help pages so that you can learn more about their modifiers.

For example here, the command “ls –help” will bring up information regarding the “ls” command. You can use it to read about the modifier that was used in this level.

Level 4 —> Level 5

For this level, you’ll need to find the only human-readable file in the inhere directory. Here, you might want to look up and learn more about search terms and commands, like “find”. It’ll come in handy later.

Level 5 —> Level 6

Your target file is located in the inhere directory, and is human-readable, 1033 bytes in size, and is not executable. If you looked into the find command for the last one, you’ll really want to use that knowledge here!

Well, that’s it for now! If you have any questions or critiques, feel free to shoot me over a form via the Contact Me page. If you’d like to read more about the topics discussed above, here are a few links:

For Complete Beginners

A Step Up From That

Advanced Bash-Scripting Guide