4.1 KiB
title | author | categories | tags | render_with_liquid | media_subpath | image | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
TryHackMe: Takeover | AmcaQt |
|
|
false | /images/thm_takeover/ |
|
{: width="600" height="150" .shadow }
https://tryhackme.com/room/takeover
Description
Hello there,
I am the CEO and one of the co-founders of futurevera.thm. In Futurevera, we believe that the future is in space. We do a lot of space research and write blogs about it. We used to help students with space questions, but we are rebuilding our support.
Recently blackhat hackers approached us saying they could takeover and are asking us for a big ransom. Please help us to find what they can takeover.
Our website is located at https://futurevera.thm
Hint: Don't forget to add the MACHINE_IP in /etc/hosts for futurevera.thm ; )
Basic Scan
As usual we've been given a MACHINE_IP and need to put it on /etc/hosts
with a named futurevera.thm
. Lets run basic scan using Nmap
┌──(amca㉿amcaqt)-[~]
└─$ nmap -A -T5 futurevera.thm
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-17 14:19 +08
Warning: 10.10.200.103 giving up on port because retransmission cap hit (2).
Nmap scan report for futurevera.thm (10.10.200.103)
Host is up (0.20s latency).
Not shown: 910 closed tcp ports (conn-refused), 87 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 dd:29:a7:0c:05:69:1f:f6:26:0a:d9:28:cd:40:f0:20 (RSA)
| 256 cb:2e:a8:6d:03:66:e9:70:eb:96:e1:f5:ba:25:cb:4e (ECDSA)
|_ 256 50:d3:4b:a8:a2:4d:1d:79:e1:7d:ac:bb:ff:0b:24:13 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Did not follow redirect to https://futurevera.thm/
|_http-server-header: Apache/2.4.41 (Ubuntu)
443/tcp open ssl/http Apache httpd 2.4.41
| ssl-cert: Subject: commonName=futurevera.thm/organizationName=Futurevera/stateOrProvinceName=Oregon/countryName=US
| Not valid before: 2022-03-13T10:05:19
|_Not valid after: 2023-03-13T10:05:19
|_http-title: FutureVera
|_http-server-header: Apache/2.4.41 (Ubuntu)
| tls-alpn:
|_ http/1.1
|_ssl-date: TLS randomness does not represent time
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.43 seconds
We foundd that there's 3 open port which is :
22
ssh
80
http
443
ssl/http
Subdomain Enumaration
First Subdomain
The Description mention support
, which I assume they have support
as their subdomain, so lets add that in /etc/hosts
and looks what we can find on that subdomain. View the subdomain on firefox and shall find this :
Second Subdomain
By clicking the View Cerificate
you shall find info about the subdomain support.futurevera.thm
. If you a little lower you'll find Subject Alternative Names with DNS Names s******************2.support.futurevera.htm
and as usual add the DNS Names in /etc/hosts
What's the value of the flag?
By viewing the DNS Names on the browser you'll obtain the flag and will be redirect to AWS Web Server.
Conclusion
This room was fun and very interesting, it made me search and try to understand what is Subdomain takeover
, and learned something new with this room.
If you want to learn more about Subdomain Takeover