In this web content, we explore the Securi-Tay 2020 TryHackMe boot-to-root challenge, highlighting the various unconventional techniques used to gain access to a target system. The article details an adventure filled with port misconfigurations, steganography, and privilege escalation, providing valuable insights and lessons learned from this Capture the Flag (CTF) challenge. Affected: website misconfigurations, cybersecurity skills, CTF competition
Keypoints :
- Starts with a unique Nmap scan revealing port misconfigurations for an Apache server and SSH.
- Firefox refuses to open sites on non-standard ports, requiring a configuration change or using cURL.
- Base64-encoded text hints at a login page and a person named “Jack,” creating a classic CTF scenario.
- OSINT leads to discovering ROT13 encryption associated with a MySpace user, adding a nostalgic twist.
- Steganography is utilized, revealing CMS credentials hidden in a header image rather than the expected dinosaur image.
- Identifies a PHP command injection vulnerability, facilitating a reverse shell attack.
- Privilege escalation is explored by locating a password list and using Hydra for SSH brute-forcing.
- User flag is cleverly hidden in an image file, showcasing the challenge’s complexity.
- Discovers SUID binaries leading to root access, emphasizing the importance of checking permissions.
- Conveys multiple lessons learned about unconventional ports, OSINT, and the interconnectedness of various hacking techniques.
Views: 6