Deception Walkthrough

Spyx · March 24, 2020

Hi all. Another day another walkthrough. I hope you enjoy learning as I do :smirk: As always i do masscan, nmap and dirb to look for some clues.

Now i know ip address let do full nmap scan

as usually we have port 22 and 80 open. Lets lunch dirb

At the end I can see machine is running wordpress. Another clue is there is robot.txt file too. Let’s have a look what we supposed to not see

Okay have a look at robots.html.

Some pop up with decreasing numbers. You can try to go zero or inspect source of this page which you will discover source of this javascript. After study code I know that when you reach 0 you will be redirect to admindelete.html page.

As you can see there was nothing useful and I start loosing my mind because i could not figure out. After some time i discover hint.html :satisfied:

Really there is some source code on main page? And sure thing there was.

After this challenge I have open element tag to look for all clues.. I collect all API and try to log in. For my first time I failed as APIs are not sorted from top to down. After correcting it i was in

You may asked how i know username. Well i was enumerate user through wpscan and get this user. I liked last 3 rows from previous picture. But looking in .bashrc explained to me :smirk:

Hehe pretty funny ale in his folder was one file. It look pretty much as mess until i was username there. Used some grep kung-fu i was able to remove all noise from there

Hmmm first line is username. Second is variable stored in A and last one is interesting. It is code for reverse this variable A. So haclabs passcode is haclabs987654321? Lets try it

Boom second flag already mine. Now to get root access. I usually look for sudo -l command to see what exactly user can run as root.

And haclabs can run everything

Hope you like this walkthrough :simple_smile:

Twitter, Facebook