Host Busters
Host Busters 1
Created by: syyntax
Turbo Tactical has gained access to a DEADFACE machine that belongs to gh0st404. This machine was used to scan one of TGRI’s websites. See if you can find anything useful in the vim user’s directory.
On a side note, it’s also a good idea to collect anything you think might be useful in the future for going after DEADFACE.
Submit the flag as flag{flag_here}.
vim@gh0st404.deadface.io
Password: letmevim
Solution
You're given an ssh host, after logging in you're automatically placed into vim. There's 3 ways (which I found) to solve the challenge.
Be a chad Vim user D:
:E-> To exit file and go to directory view, go up a directory, go tovimhome, open flag file.Type
:terto open subterminal and same as above.Type
:shellto gain fully interactive shell, defaults to /bin/sh, typebashto switch to bash.
➜ ssh vim@gh0st404.deadface.io
...
Type: `:shell`
$ ls
hostbusters1.txt
$ cat ho*
flag{esc4P3_fr0m_th3_V1M}Flag: flag{esc4P3_fr0m_th3_V1M}
Host Busters 2
Created by: syyntax
Now that you’ve escaped out of vim, scope out and characterize the machine. See if there are any other flags you can find without having to escalate to another user.
Solution
Probably the trickiest of all, there should be a flag somewhere but without escalating to other user.
sudo -l came empty handed.
No interesting processes
gh0st404 had some files which had nmap scans of website, so I thought some port might be open. nmap was taking ages so I just checked for netstat.
A weird connection, lets try connecting.
Flag: flag{Hunt_4_UDP_s3rv3r}
Host Busters 3
Created by: syyntax
Continue characterizing the machine. Is there any way you can escalate to a user that has permissions the vim user does not have? Find the flag associated with this user.
Solution
hostbusters3.txt can be found in the directory of user gh0st404, but we dont have permission to read the file, only the author. gh0st404 has left an interesting file: id_rsa, we can use this private key to login using ssh without password since private key takes care of it.
Flag: flag{Embr4c3_th3_K3y_t0_5ucc355!}
Host Busters 4
Created by: syyntax
TGRI believes a sensitive project proposal was compromised in a recent attack from DEADFACE. Find the proposal and submit the flag associated with this document.
Solution
gh0st404 has an interesting permission, no sudo on nmap -> GTFOBins nmap
If you noticed spookyboi had some pdf in his directory, lets try seeing it.
Flag: flag{Abus3_oF_p0w3R}
Host Busters 5
Created by: syyntax
See if you can crack gh0st404’s password. Based on Ghost Town conversations, we suspect the password is found in common wordlists.
Solution
User passwords in linux systems are stored in /etc/shadow and common wordlist for passwords is rockyou.txt
Gain root shell from nmap and read shadow.
Start cracking
Flag: flag{zaq12wsx}
Last updated