Writeups

TryHackMe | Simple CTF

Scan first 1,000 ports: nmap -T4 -A <ip>

We have ftp, http, and ssh

We have anonymous access to access ftp, so we can enter the command ftp <ip> and then at the prompt anonymous

Once inside, type the keyword passive to disable passive mode and successfully navigate through the files in the ftp server.

Untitled

catting the file in local machine, we know that the system password is very weak and we can try to brute force that. We also know there is likely a user on the system called mitch

We know he used the same password on some application on the system.

looking on the http server, there is some information we can find on the robots.txt file

Untitled

mike might be another user on the system, /openemr might be useful, and we know there is a CUPS server, which stands for Common UNIX printing system, but none of those ports were open so we can discount it

Untitled

Trying to get information about the directory, we can see that there’s nothing here really for us to use

Using dirbuster & we can find a directory called simple. Navigating to that, we find

Untitled

at the bottom of the page, to which we can find the CVE of CVE-2019-9053 by searching for an exploit of CMS Made Simple, which gives us an SQL Injection we can use

We can use searchsploit to look for the exploit for the version

searchsploit "CMS Made Simple"

run the corresponding python file matching searchsploit’s findings