<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Rafael Tavares </title>
    <description>The latest articles on DEV Community by Rafael Tavares  (@rafaaeltavares).</description>
    <link>https://dev.to/rafaaeltavares</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1267951%2F9509c052-ce8f-402c-ba95-56d5d57f14a4.jpg</url>
      <title>DEV Community: Rafael Tavares </title>
      <link>https://dev.to/rafaaeltavares</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rafaaeltavares"/>
    <language>en</language>
    <item>
      <title>Try hack me Brooklyn Nine Nine CTF Write-Up</title>
      <dc:creator>Rafael Tavares </dc:creator>
      <pubDate>Sun, 28 Jan 2024 20:03:10 +0000</pubDate>
      <link>https://dev.to/rafaaeltavares/try-hack-me-brooklyn-nine-nine-ctf-write-up-17p9</link>
      <guid>https://dev.to/rafaaeltavares/try-hack-me-brooklyn-nine-nine-ctf-write-up-17p9</guid>
      <description>&lt;h2&gt;
  
  
  CTF do Brooklyn Nine Nine de nível Fácil
&lt;/h2&gt;

&lt;p&gt;Bom, após iniciar a máquina do ctf o THM nos fornece um IP para a gente fazer o reconhecimento.&lt;/p&gt;

&lt;p&gt;dito isso, vamos partir para o scanning pra verificar quais portas estão abertas na máquina que vamos invadir.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8z8jo7pspfce5ukp1ka.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8z8jo7pspfce5ukp1ka.png" alt="Image description" width="800" height="223"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;utilizando o nmap com a flag -sV ele retorna os serviços que estão com portas abertas mais as versões desses serviços.&lt;/p&gt;

&lt;p&gt;podemos ver que a máquina da vítima está com 3 portas abertas&lt;br&gt;
&lt;em&gt;ssh &lt;br&gt;
ftp &lt;br&gt;
http&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Nesse caso irei tentar acessar o ftp com as credenciais padrão do próprio serviço que no caso é "anonymous" tanto para usuário e senha.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqujmto1w216apcylajx0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqujmto1w216apcylajx0.png" alt="Image description" width="467" height="245"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;entramos no ftp.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;utilizando o comando &lt;em&gt;ls&lt;/em&gt; podemos observar que existe um arquivo chamado &lt;strong&gt;note_to_jake.txt&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fldr80btav4m9g9zt50zl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fldr80btav4m9g9zt50zl.png" alt="Image description" width="800" height="110"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;utilizei o comando get para baixar o arquivo para a nossa máquina para conseguir analizar.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fygs6nfroorgi9jijg28z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fygs6nfroorgi9jijg28z.png" alt="Image description" width="800" height="93"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;BOOM&lt;/em&gt;&lt;br&gt;
Informações interessantes, parece que o jake tem uma senha muito fraca, qualquer coisa podemos quebra-la.&lt;/p&gt;

&lt;h2&gt;
  
  
  Vamos focar nossa atenção para os outros serviços abertos.
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;ssh &lt;br&gt;
&lt;del&gt;ftp&lt;/del&gt; &lt;br&gt;
http&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Colocando o IP da máquina no navegador não traz muita coisa, apenas uma página web estática com o banner de Broklyn Nine Nine e por falta de resultados mesmo utilizando o gobuster para fazer um brute-force em possíveis diretórios escondidos a melhor opção seria partir para o próximo serviço, ssh.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fedvhbytojhffjvbamkmn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fedvhbytojhffjvbamkmn.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;br&gt;
Bom agora só está faltando o serviço ssh para análisar&lt;br&gt;
&lt;em&gt;ssh &lt;br&gt;
&lt;del&gt;ftp&lt;/del&gt; &lt;br&gt;
&lt;del&gt;http&lt;/del&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Utilizando o arquivo que a gente encontrou no ftp na qual diz que a senha do jake é muito fraca, podemos utilizar o hydra para quebrar a senha do jake e assim acessar a máquina via ssh.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rsoo2d9vqfdkfknxv9y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rsoo2d9vqfdkfknxv9y.png" alt="Image description" width="800" height="173"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Encontramos!!!&lt;/em&gt;&lt;br&gt;
Estamos dentro.&lt;/p&gt;

&lt;h2&gt;
  
  
  Explorando a máquina
&lt;/h2&gt;

&lt;p&gt;Bom explorando um pouco os diretórios de usuários descobrimos outro usuário dentro do computador, o "Holt"&lt;/p&gt;

&lt;p&gt;entrando na home do holt e vendo os arquivos que existem encontramos a primeira flag que precisamos para completar o ctf, user.txt&lt;br&gt;
&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuw726yv2kg3fevo0ebka.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuw726yv2kg3fevo0ebka.jpg" alt="Image description" width="564" height="125"&gt;&lt;/a&gt;&lt;br&gt;
Beleza agora, só precisamos escalar privilégios para acessar a root flag e terminar o desafio.&lt;/p&gt;

&lt;p&gt;Vamos utilizar o comando sudo -l para verificar se o usuário em que estamos logado pode executar como administrador em alguma pasta ou arquivo da máquina&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw7rsm11z91gisx9qfxxg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw7rsm11z91gisx9qfxxg.png" alt="Image description" width="800" height="100"&gt;&lt;/a&gt;&lt;br&gt;
Descobrimos que na pasta /usr/bin/less o nosso usuário consegue executar comandos como administrador!!&lt;/p&gt;

&lt;p&gt;nesse caso vamos utilizar isso para capturar a root flag.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;sudo /usr/bin/less nano /root/root.txt&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbjpc2tekrk8vmfwglzam.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbjpc2tekrk8vmfwglzam.jpg" alt="Image description" width="624" height="139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;:) &lt;/p&gt;

&lt;p&gt;Foi um ctf bem tranquilo e divertido, espero que eu tenha ajudado!&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
