Jack of All Trades: Securi-Tay 2020 – Write-Up

Jack of All Trades: Securi-Tay 2020 – Write-Up
In this web content, we explore the Securi-Tay 2020 TryHackMe boot-to-root challenge, highlighting the various unconventional techniques used to gain access to a target system. The article details an adventure filled with port misconfigurations, steganography, and privilege escalation, providing valuable insights and lessons learned from this Capture the Flag (CTF) challenge. Affected: website misconfigurations, cybersecurity skills, CTF competition

Keypoints :

  • Starts with a unique Nmap scan revealing port misconfigurations for an Apache server and SSH.
  • Firefox refuses to open sites on non-standard ports, requiring a configuration change or using cURL.
  • Base64-encoded text hints at a login page and a person named “Jack,” creating a classic CTF scenario.
  • OSINT leads to discovering ROT13 encryption associated with a MySpace user, adding a nostalgic twist.
  • Steganography is utilized, revealing CMS credentials hidden in a header image rather than the expected dinosaur image.
  • Identifies a PHP command injection vulnerability, facilitating a reverse shell attack.
  • Privilege escalation is explored by locating a password list and using Hydra for SSH brute-forcing.
  • User flag is cleverly hidden in an image file, showcasing the challenge’s complexity.
  • Discovers SUID binaries leading to root access, emphasizing the importance of checking permissions.
  • Conveys multiple lessons learned about unconventional ports, OSINT, and the interconnectedness of various hacking techniques.

Full Story: https://infosecwriteups.com/jack-of-all-trades-securi-tay-2020-write-up-77342bddf6cc?source=rss—-7b722bfd1b8d—4

Views: 6