Try-hack-me

ANTHEM : Walkthrough

In this writeup, we are going to solve a CTF room called “Anthem” created by Chevalier. I’ve taken a hint-only approach so you can enjoy this room as much as I did, but I am sure that this would be enough to eliminate any of your questions and difficulties.

Task 1 – Website Analysis
As being said in the task, we need to run a nmap scan and identify open ports.
Since it’s a CTF room, a really quick scan of all ports would be enough here.
#nmap -p- -vv <target IP> -Pn


We look at the above nmap scan and figure out which is the correct port for the webserver
We look at the above nmap scan and figure out which is the correct port for the Remote Desktop Service
Let’s open the website in our browser.


Let’s check website’s “/robots.txt” directory, & we find some interesting stuff there. Including a possible password.

Now we can retrieve both password and CMS name through above step.
Answer for questions six is located on the webserver port (see question two). Navigate to IP:PORT and you’ll see the domain!
It gets a bit trickier here as the room is gaining more and more CTF tasks. In this case, admin’s name is not directly stated on the website, but it contains enough information to get it.
Scroll down to the bottom you will see “Anthem.com”
and now go and click on post “A cheers to our IT department”
See that poem? Search it up on Google, & you will see the admin username.


Go to website’s “We are hiring” post & based on the email format with the name of the author, you can figure out the email of the admin.


Task 2 – Spot the flags

🏳️ FLAG 1 & 2:  Go to main website & then go to “We are Hiring page”. Open the source code & you will find first and second flag there.
Quick Tip: – As the Room describes that the flag are in the format “THM{}” Therefore, Search “THM” inside the source code by pressing “CTRL+F”.

🏳️ FLAG 3: Click on “Jane Doe” in the “We are Hiring” Page Section.

🏳️ FLAG 4: You will find fourth flag in the source code of “A Cheers to our department” Page.

Task 3 – Final stage

CTF format of this room suggests that there’s no need to actually exploit anything. Task 1 can help us to gain remote access to the box.
Launch your RDP application and plug in your known data:


Once the user logs in a file is on the desktop that contains the flag.
There is a hidden folder on the root of the C:\ that file had the permissions removed however SG has ownership over the file. So he has to give himself permissions to read it.


After getting the Administrator password, its time to get root flag 

The root flag is located in a very obvious place. Go to drive C:\ -> Users -> Administrator -> Desktop and there it is!


Thank you very much for reading. I hope you find this blog useful.

!!!!Happy Hacking!!!!















Comments

Popular posts from this blog

Try Hack Me - Simple CTF