Post

Sws101_ctfjournal1

Try Hack Me Room: Simple CTF

CTF

When I paste the ip address on the browser, it showed like this; CTF

It looks like a default Ubuntu installation. Now lets scan the machine CTF

How many services are running under port 1000?

ANS: 2

What is running on the higher port?

ANS: ssh

What’s the CVE you’re using against the application?

To know this answer, let’s find out the hidden files using ffuf. CTF

We found that there is a hidden directory /simple let’s check it out. CTF

Here we can see this is a default page for something called “CMS Made Simple” and if we look in the bottom corner we can see it is version 2.2.8. Let’s search in exploit DB for CMS Made Simple 2.2.8 exploit. CTF

We are going to use this cve.
ANS: CVE-2019-9053

To what kind of vulnerability is the application vulnerable?

It is vulnerable to SQL injection
ANS: SQLi

What’s the password?

To get the password, I started the exploit using the python script given in the CVE. First I copy pasted that python script and save as exploit.py. CTF

Next I ran this python file in the terminal. Command to run the python file is
python3 exploit.py -u http://10.10.137.253/simple/

CTF

I cracked that password and got as the password secret

ANS: secret

Where can you login with the details obtained?

ANS: ssh

What’s the user flag?

Using username and password, now lets login into ssh ANS:G00d j0b, keep up!

Is there any other user in the home directory? What’s its name?

ANS: sunbath

What can you leverage to spawn a privileged shell?

ANS: vim

What’s the root flag?

ANS: W3ll d0n3. You made it!

Conclusion

I have written the basic walkthrough of simplectf from try hack me room.

This post is licensed under CC BY 4.0 by the author.

Trending Tags