HackMyVM Number Walkthrough
- by Vince
-
in Blog
-
Hits: 1126
Another cyber range appeared recently and it's similar to Vulnhub where people upload VM's, you download them, and get flags. There's a points system like TryHackMe and HackTheBox which is a great way to gamify the environment. I was curious to play and I download Number.
The box does not have a description other than it states that it's a Medium level system.
We kick off with Nmap:
We find a web port. Enumerating with Nikto:
Then with GoBuster:
We find a login:
But after a few seconds of looking around, I feel like there's something missing. We check out /pin:
We capture a request in Burp and we send it to Intruder:
Using Sniper, we'll attempt to brute force the pin:
Using seq -w 0000 4444, I create a list of numbers for our brute force:
Adding in the error message:
After a few seconds (Burp Pro), we learn the pin is 4444:
We go back to the pin page and enter our pin:
That doesn't help us:
We move back to Sniper thinking that 4444 is our password:
I'm just using a subset of RockYou as my wordlist, I think it's 100k lines:
Entering the error message:
After a bit, we uncover the username: melon
Back to the login:
We are then presented with yet another form:
We enter an IP address but it only accepts numbers:
Just a quick sanity check:
It likes numbers, not decimal points. We can convert an IP to decimal:
I enter the decimal equivalent of my attacking machine:
Since it's spawning a reverse shell, I setup tcpdump because I need to know which port:
When we hit submit, we see an inbound connection on the familiar 4444. We setup a handler:
After we submit again, we catch a shell. When we clean is up, we enter into the melon home directory and we find:
When cat look at flag.sh, we find:
This won't work for us since we're not the user melon. Since we're unable to SSH, I assume the password has to be simple.
You can read the flag at this point without the use of the script. Checking sudo privileges:
We elevate using hping3 and we only have one last thing to do: