Markup writeup

10.129.6.59

Task 1 – What version of Apache is running on the target’s port 80?

Scanned the machine with nmap.

I recall I could just be more efficient and use rustscan for this. I’ll start doing this in the future.

A: 2.4.41

Task 2 – What username:password combination logs in successfully?

Navigated to the webpage, checked robots.txt and source code but didn’t see much. Tried a few default/simple credentials and admin:password worked.

A: admin:password

Task 3 – What is the word at the top of the page that accepts user input?

Clicked around and Order has input forms.

A: Order

Task 4 – What XML version is used on the target?

Looked at the source code and on line 94 we see version.

A: 1.0

Task 5 – What does the XXE / XEE attack acronym stand for?

If you don’t know this just google it.

A: XML External Entity

Task 6 – What username can we find on the webpage’s HTML code?

Line 8 

A: Daniel

Task 7 – What is the file located in the Log-Management folder on the target?

So I had once done a Tryhackme room that taught XXE but I don’t exactly recall how to use it but let’s open Burpsuite. I grabbed a request from the Order web page and forwarded it to repeater. For a while I was attempting to input “”<!DOCTYPE foo [<!ELEMENT foo ANY >\<!ENTITY xxe SYSTEM “file:///etc/passwd” >]>”” and tested in each form added “”&xxe”” into different fields but I don’t really have the understanding of the concept down, I was basically just bruteforcing a command I found in my notes. I understand enough that XML is a language, and its being used on the page so some payload should be able to possibly allow us to see files that we shouldn’t be able to see.

I referred to the writeup for this part after a while. So first, I’m just dumb- this is a Windows machine so obviously /etc/passwd doesn’t even exist on the device. I was close with the command otherwise but I also had an additional part of the command. This is what we actually need.

Since daniel is a possible use on the machine we can look around his directory. We can find a ssh key.

I was having some issues, then realized that I also copied the ‘Your order for’ in the key. Make sure you remove that part. Then we get access to daniel.

Navigating to Log-Management we see a file.

A: job.bat

Task 8 – What executable is mentioned in the file mentioned before?

A: wevtutil.exe

Submit user flag:

Got this earlier when I first had access to daniel’s account.

A: 032d2fc8952a8c24e39c8f0ee9918ef7

Submit root flag –

We can see that we have access to the file as daniel is a part of Users.

We can likely get a shell off of this. Downloaded netcat for windows on the victim machine, over wrote the file then set up a listener.

And then we get a response and get admin.

Then we navigate to the Administrator desktop and root.txt is there.

A: f574a3e7650cebd8c39784299cb570f8

GG

Leave a comment