Host Busters

Host Busters 1

Created by: syyntax

Turbo Tactical has gained access to a DEADFACE machine that belongs to gh0st404. This machine was used to scan one of TGRI’s websites. See if you can find anything useful in the vim user’s directory.

On a side note, it’s also a good idea to collect anything you think might be useful in the future for going after DEADFACE.

Submit the flag as flag{flag_here}.

vim@gh0st404.deadface.io

Password: letmevim

Solution

You're given an ssh host, after logging in you're automatically placed into vim. There's 3 ways (which I found) to solve the challenge.

  1. Be a chad Vim user D: :E -> To exit file and go to directory view, go up a directory, go to vim home, open flag file.

  2. Type :ter to open subterminal and same as above.

  3. Type :shell to gain fully interactive shell, defaults to /bin/sh, type bash to switch to bash.

➜ ssh vim@gh0st404.deadface.io
...
Type: `:shell`
$ ls
hostbusters1.txt
$ cat ho*
flag{esc4P3_fr0m_th3_V1M}
circle-check

Host Busters 2

Created by: syyntax

Now that you’ve escaped out of vim, scope out and characterize the machine. See if there are any other flags you can find without having to escalate to another user.

Solution

Probably the trickiest of all, there should be a flag somewhere but without escalating to other user.

sudo -l came empty handed.

No interesting processes

gh0st404 had some files which had nmap scans of website, so I thought some port might be open. nmap was taking ages so I just checked for netstat.

A weird connection, lets try connecting.

circle-check

Host Busters 3

Created by: syyntax

Continue characterizing the machine. Is there any way you can escalate to a user that has permissions the vim user does not have? Find the flag associated with this user.

Solution

hostbusters3.txt can be found in the directory of user gh0st404, but we dont have permission to read the file, only the author. gh0st404 has left an interesting file: id_rsa, we can use this private key to login using ssh without password since private key takes care of it.

circle-check

Host Busters 4

Created by: syyntax

TGRI believes a sensitive project proposal was compromised in a recent attack from DEADFACE. Find the proposal and submit the flag associated with this document.

Solution

gh0st404 has an interesting permission, no sudo on nmap -> GTFOBins nmaparrow-up-right

If you noticed spookyboi had some pdf in his directory, lets try seeing it.

circle-check

Host Busters 5

Created by: syyntax

See if you can crack gh0st404’s password. Based on Ghost Town conversations, we suspect the password is found in common wordlists.

Solution

User passwords in linux systems are stored in /etc/shadow and common wordlist for passwords is rockyou.txt

Gain root shell from nmap and read shadow.

Start cracking

circle-check

Last updated