TryHackMe-Advent-of-Cyber/07-Skilling-Up

From aldeid
Jump to navigation Jump to search
You are here
07-Skilling_Up

[Day 7] Skilling Up

Description

Previously, we saw mcsysadmin learning the basics of Linux. With the on-going crisis, McElferson has been very impressed and is looking to push mcsysadmin to the security team. One of the first things they have to do is look at some strange machines that they found on their network.

Check out the supporting material here.

#1 - how many TCP ports under 1000 are open?

$ sudo nmap -sS -sV -A -p- 10.10.219.159
[sudo] password for unknown: 
Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-02 07:54 CEST
Nmap scan report for 10.10.219.159
Host is up (0.051s latency).
Not shown: 65531 closed ports
PORT      STATE SERVICE VERSION
22/tcp    open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 aa:35:92:fc:1b:3e:90:e3:9d:cf:5b:56:b5:c7:ec:09 (RSA)
|   256 c7:28:e5:ac:51:ef:f0:b1:c1:5f:d7:2e:d7:29:e4:51 (ECDSA)
|_  256 1e:e1:81:bc:fd:33:da:6b:a8:54:a4:e6:26:fc:3b:c2 (ED25519)
111/tcp   open  rpcbind 2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100024  1          47513/udp6  status
|   100024  1          50702/udp   status
|   100024  1          54567/tcp6  status
|_  100024  1          60863/tcp   status
999/tcp   open  http    SimpleHTTPServer 0.6 (Python 3.6.8)
|_http-server-header: SimpleHTTP/0.6 Python/3.6.8
|_http-title: Directory listing for /
60863/tcp open  status  1 (RPC #100024)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=5/2%OT=22%CT=1%CU=41812%PV=Y%DS=2%DC=T%G=Y%TM=5EAD0BB6
OS:%P=x86_64-pc-linux-gnu)SEQ(SP=100%GCD=1%ISR=107%TI=Z%CI=Z%II=I%TS=A)OPS(
OS:O1=M508ST11NW6%O2=M508ST11NW6%O3=M508NNT11NW6%O4=M508ST11NW6%O5=M508ST11
OS:NW6%O6=M508ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W5=68DF%W6=68DF)ECN(
OS:R=Y%DF=Y%T=FF%W=6903%O=M508NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=FF%S=O%A=S+%F=AS
OS:%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=FF%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=
OS:Y%DF=Y%T=FF%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=FF%W=0%S=A%A=Z%F=
OS:R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=FF%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T
OS:=FF%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=FF%CD=
OS:S)

Network Distance: 2 hops

TRACEROUTE (using port 256/tcp)
HOP RTT      ADDRESS
1   46.06 ms 10.9.0.1
2   45.09 ms 10.10.219.159

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 155.19 seconds

Answer: There are 3 open ports under 1000: 22, 111, 999

#2 - What is the name of the OS of the host?

The host is running linux.

#3 - What version of SSH is running?

OpenSSH version 7.4 is running on the host.

#4 - What is the name of the file that is accessible on the server you found running?

The HTTP service on port 999 is hosting a file (interesting.file). It’s an empty file.

$ curl -s http://10.10.219.159:999/ | html2text 
****** Directory listing for / ******
===============================================================================
    * interesting.file
===============================================================================