haclabs: Deception Walkthrough
reference | haclabs: Deception |
target ip | 192.168.1.20 |
Scan with nmap
:
Enumerate port 80 with gobuster
:
Enumerate wordpress
users with wpscan
:
1 | wpscan --url http://192.168.1.20/wordpress -e u --no-banner |
Check robots.txt
with curl
:
robots.html
leads to admindelete.html
:
Look for a hint.html
:
Turn to the home page and check for those API token:
1 | API old0 : 5F4DCC3B5AA |
1 | apt install hashcat-utils |
Combine the hash in the order of old0
, old1
, old2
, new
:
1 | 5F4DCC3B5AA765D61D8327DEB882CF99 |
Another hint from the web:
Escalate to user yash
with password 5F4DCC3B5AA765D61D8327DEB882CF99
:
.systemlogs
hidden file can be found:
1 | haclabs |
Escalate to user haclabs
with password haclabs987654321
:
flag2.txt
:
Escalate to user root
is very straightforward:
Username/password of mysql
can be found from /var/www/html/wordpress/wp-config.php
:
Enumerate mysql
users:
1 | root:cry4moon |