I am going to do a nmap scan:
| |
We see that we have a ftp server with some images in it.
I downloaded them and tried to upload a file, but it didnβt work out, so I am going to explore the web page.
In the http page there is nothing of interest, but in the https page there is a subdirectory that we can look for:
| |
And we got a message:

We can decypher with cyberchef:

From there we can find this email address: bubblegum@land-of-ooo.com, which we should put in the hosts file.
Now that we found jake we should re-enumerate the website:
| |
We found another subdirectory
Another time:
| |
And now we got another code:

This time we got this:

I tried to put that in the service running but no luck:
| |
So I just started another fuzzer
| |
And finally we got what we were searching:

This is either AES or DES,

It was AES.
And we got that:
| |
So I tried using ssh with the password that we found before:
| |
There there are 2 flags, flag1, and flag, the flag one is encrypted in md5.
Since the hint tells us: (Can you search for someones files?)
I searched for the files owned by marceline:
| |
| |
I first tought that was rot13, but after seaching for a while I tried the vigenere one, which requires a key, that in this case would be βgoneβ
| |
So we got marcelineβs password
And we enter ssh with marceline with the password that we just found.
| |
Apparently this is spoon code.
| |
And finally we got the magic word.
Which tells us the peppermint password.
| |
So now we can switch user and retrieve the flag:
| |
We can see a picture in the home directory.
| |
Using βToKeepASecretSafeβ as a password, we are able to find a zip file in the image:
| |
The zip is protected by a password, and we can unzip it using the other password βThisIsReallySaveβ:
| |
So now we know that the password starts with The Ice King s and has other 4 characters.
I usedΒ https://scrabblewordfinder.org/5-letter-words-starting-with/sΒ to built a text file of possible that Iβll use with hydra.
| |
So, now we can go to the gunter home and retrieve the flag.
Now I am going to search for root SUIDs:
| |
Exim is a strange file.
| |
I found this exploit:Β https://raw.githubusercontent.com/AzizMea/CVE-2019-10149-privilege-escalation/master/wizard.pyΒ
we can copy the script, change the port to the one that exim4 is running and execute it.
| |
So now we just want to find the last flag, which is in the bubblegum home.
| |