This task involves you, paying attention to details and finding the ‘keys to the castle’.
This room is designed for beginners, however, everyone is welcomed to try it out!
Enjoy the Anthem.
In this room, you don’t need to brute force any login page. Just your preferred browser and Remote Desktop.
#1 Let’s run nmap and check what ports are open.
➜ TryHackMe nmap -sV -sC -A -vv 10.10.128.241
24/tcp filtered priv-mail no-response
80/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-methods:
|_ Supported Methods: OPTIONS
135/tcp open msrpc syn-ack Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
445/tcp open microsoft-ds? syn-ack
3389/tcp open ms-wbt-server syn-ack Microsoft Terminal Services
| rdp-ntlm-info:
| Target_Name: WIN-LU09299160F
| NetBIOS_Domain_Name: WIN-LU09299160F
| NetBIOS_Computer_Name: WIN-LU09299160F
| DNS_Domain_Name: WIN-LU09299160F
| DNS_Computer_Name: WIN-LU09299160F
| Product_Version: 10.0.17763
|_ System_Time: 2020-05-17T20:55:06+00:00
| ssl-cert: Subject: commonName=WIN-LU09299160F
| Issuer: commonName=WIN-LU09299160F
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-04-04T22:56:38
| Not valid after: 2020-10-04T22:56:38
| MD5: 2814 61de 95b7 e9b5 4789 3027 7f1f 60d2
| SHA-1: d47d 2a8f 6143 b820 936e 4120 cdd1 9ddc 5385 d285
| -----BEGIN CERTIFICATE-----
| MIIC4jCCAcqgAwIBAgIQObhN9c8QnIVGx+ZslzEOmzANBgkqhkiG9w0BAQsFADAa
| MRgwFgYDVQQDEw9XSU4tTFUwOTI5OTE2MEYwHhcNMjAwNDA0MjI1NjM4WhcNMjAx
| MDA0MjI1NjM4WjAaMRgwFgYDVQQDEw9XSU4tTFUwOTI5OTE2MEYwggEiMA0GCSqG
| SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDA4MPIi4yCYJlBv6vwXF5lu5NbQCPQxk4q
| 7lJsJSvTRSIFi2fVl3l+rWTr69mutnVqo+bMilJorN2B6DqsCJBV+7pITFSICM6b
| +G/sOEblVust2tUU8NLbAiBH9oXhF0P5dIhMzRC4pcZjhCRR+IcOjnABTCkdAchD
| Mf4XQJx6GZOXBCBMXGW/vCKZ0q8gti7Hxs36W1ctbj8/i5obd0k0BonMlvRwKxvi
| 7SS+3NrBpc4XivD23YIqCNzErOB19DV3JqZMvbE+NhLEQA51Au2svYwgoJcIIyEC
| HBuINXeFBB+p5dMwp4wppkHN0CuquUyCBZvIPlDW8SAOAc5tgUOJAgMBAAGjJDAi
| MBMGA1UdJQQMMAoGCCsGAQUFBwMBMAsGA1UdDwQEAwIEMDANBgkqhkiG9w0BAQsF
| AAOCAQEAAziR6P3nN9/EKLhZqJKgkWP9FyNr9CusD78wem1C5fn9h7SjS1PQEhn1
| Gi50rlcUmII4E8Bnv6g/1QZnZIsPtVzO3bokQfbhTEzWOQ8RScB3ZQ+Tg7xM4duA
| NZdzR1/hjOOmPBV4ih3+AKmbEZ63V3PuJOn2+0/NsGXzGKhaNhlAof58lXkXrt9x
| DvmpyfER7oq/3+kPQhXlNK7VZ/dp26BLFQT12be1yyeVck2n/90pXTxV/COaIdsF
| q7RJPVO+4FCua77sUUSV9E5CL3oOFJT5MjkAMEkoKsU9InWHhA5w+ndQqDgXIb40
| 7b3pD6AiS/ZEvSpzCyeVnDprZxVIaQ==
|_-----END CERTIFICATE-----
|_ssl-date: 2020-05-17T20:55:54+00:00; +2s from scanner time.
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 1s, deviation: 0s, median: 0s
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 8918/tcp): CLEAN (Couldn t connect)
| Check 2 (port 27612/tcp): CLEAN (Couldn t connect)
| Check 3 (port 8570/udp): CLEAN (Failed to receive data)
| Check 4 (port 26852/udp): CLEAN (Timeout)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2020-05-17T20:55:09
|_ start_date: N/A
#2 What port is for the web server?
80/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-methods:
|_ Supported Methods: OPTIONS
#3 What port is for remote desktop service?
3389/tcp open ms-wbt-server syn-ack Microsoft Terminal Services
| rdp-ntlm-info:
| Target_Name: WIN-LU09299160F
| NetBIOS_Domain_Name: WIN-LU09299160F
| NetBIOS_Computer_Name: WIN-LU09299160F
| DNS_Domain_Name: WIN-LU09299160F
| DNS_Computer_Name: WIN-LU09299160F
| Product_Version: 10.0.17763
|_ System_Time: 2020-05-17T20:55:06+00:00
#4 What is a possible password in one of the pages web crawlers check for?
UmbracoIsTheBest!
#5 What CMS is the website using?
Umbraco
#6 What is the domain of the website?
Anthem.com
#7 What’s the name of the Administrator
Solomon Grundy
#8 Can we find find the email address of the administrator?
The pattern of the email address is the first letter of the firstname and the lastname
Solomon Grundy
SG@anthem.com
Our beloved admin left some flags behind that we require to gather before we proceed to the next task..
#1 What is flag 1?
THM{L0L_WH0_US3S_M3T4}
#2 What is flag 2?
THM{G!T_G00D}
#3 What is flag 3?
THM{L0L_WH0_D15}
#4 What is flag 4?
THM{AN0TH3R_M3TA}
Let’s get into the box using the intel we gathered.
#1 Let’s figure out the username and password to log in to the box.(The box is not on a domain)
No awnser is needed
#2 Gain initial access to the machine, what is the contents of user.txt?
Let’s use remmina desktop and connect to the VM
login : SG
password : UmbracoIsTheBest!
THM{N00T_NO0T}
#3 Can we spot the admin password?
I tried this
dir *.txt /s /p
But nothing came out sadly.. :(
Let’s try something else..
This one is a little bit tricky but very simple to execute.
First step :
Show all the hidden files
Second step :
Go to the C: Drive and as you can see there is a backup hidden folder
Right click on it and go to the proprieties uncheck the “hidden” square
Third and final step :
Add SG (the user) to have the permission to see the file
Right click → Security tab → Advanced → Add
And finally click on the Check Names button and then allow all permissions to the file
ChangeMeBaby1MoreTime
#4 Escalate your privileges to root, what is the contents of root.txt?
You have two possibilities here..
You can relaunch the remmina app and log with the Administrator account
Or you can stay with the SG’s account and go to the following path
C:\Users\Administrator\Desktop
The Administrator’s password is :
ChangeMeBaby1MoreTime
THM{Y0U_4R3_1337}