Takeover
TryHackme Takeover writeup by Thamizhiniyan C S
Last updated
TryHackme Takeover writeup by Thamizhiniyan C S
Last updated
Greetings everyone,
In this write-up, we will tackle PC from TryHackMe.
Machine link: Takeover
Difficulty Level: Easy
Let's Begin 🙌
Firstly, connect to the THM server using the OpenVPN configuration file generated by THM. Click Here to learn more about how to connect to VPN and access the boxes.
Once connected to the VPN service, click on "Start Machine" to access the machine's IP.
Upon joining the machine, you will be able to view the IP address of the target machine.
rustscan -a 10.10.89.215
The Target machine has three services running:
Port | Service |
---|---|
22 | SSH |
80 | HTTP |
443 | HTTPS |
Add the Machines’s IP address to /etc/hosts
file in your attack box with reference to futurevera.thm
and save it.
Now lets check the HTTP website running on port 80. It was a simple landing page. Nothing interesting found.
Next I started enumeration. I tried directory enumeration, but didn’t get anything.
So next I tried subdomain enumeration on the target.
I used ffuf
for this task.
The result had a lots of 302
response. So this time I filtered out all the response with a status code 302
and ran the command again.
And this time found two subdomains. Now make sure to add these subdomains to the /etc/hosts
file. You have to append the subdomains with the full url [ Eg: portal.futurevera.thm
] to the previously add host separated by a space:
Remember to add all the subdomains to the /etc/hosts
file to the respective IP address to access those subdomains.
Now I checked the portal.futurevera.thm
subdomain.
It wasn’t accessible. So next I checked payroll.futurevera.thm
subdomain.
That was also not accessible.
Now we can check the HTTPS website:
It resulted in the same landing page.
Next run ffuf
on the HTTPS service to find the subdomains running via HTTPS.
Since all the request has a response with a status code of 200, our filter for code 302 didn’t work. So this time I tried to filter using size, since all the response sizes are 4605
.
And found two new subdomains. Now append these subdomains to the /etc/hosts
file.
Navigate to https://blog.futurevera.thm/
.
Nothing serious found in this website.
Next I checked the https://support.futurevera.thm/
It has also nothing.
So next I started to look for the certificates in all of the above subdomains.
You can view the certificate of a website as shown in the video below:
First I checked the certificate of blog.futurevera.thm
. Didn’t found anything interesting.
Next I checked the certificate of support.futurevera.thm
.
We can see that the value of DNS Name
property is referring to secrethelpdesk934752.support.futurevera.thm
.
Now append this domain to the /etc/hosts
file.
If we navigate to secrethelpdesk934752.support.futurevera.thm
, we can see a server not found error.
But if you take a look at the error, you can see the server url, which contains the flag.
We have successfully found the flag.
Thank You …..