haclabs: Deception Walkthrough

reference haclabs: Deception
target ip 192.168.1.20

Scan with nmap:

Enumerate port 80 with gobuster:

Enumerate wordpress users with wpscan:

1
wpscan --url http://192.168.1.20/wordpress -e u --no-banner

Check robots.txt with curl:

robots.html leads to admindelete.html:

Look for a hint.html:

Turn to the home page and check for those API token:

1
2
3
4
API old0 : 5F4DCC3B5AA
API old2 : 327DEB
API old 1 : 765D61D8
API new : 882CF99

Combinator Attack

1
2
apt install hashcat-utils
/usr/share/hashcat-utils/combinator.bin file1 file2

Combine the hash in the order of old0, old1, old2, new:

1
5F4DCC3B5AA765D61D8327DEB882CF99

Another hint from the web:

Escalate to user yash with password 5F4DCC3B5AA765D61D8327DEB882CF99:

.systemlogs hidden file can be found:

1
2
3
haclabs
A=123456789
+A[::-1] // reverse an array

Escalate to user haclabs with password haclabs987654321:

flag2.txt:

Escalate to user root is very straightforward:


Username/password of mysql can be found from /var/www/html/wordpress/wp-config.php:

Enumerate mysql users:

1
2
root:cry4moon
haclabs:crymoon