Dockerlabs - BorazuwarahCTF Dockerlabs - BorazuwarahCTF

Dockerlabs - BorazuwarahCTF

BorazuwarahCTF

✌️ Introduction

We will solve the BorazuwarahCTF machine from Dockerlabs, which will allow us to achieve the following learning objectives:

•Use a brute force attack to compromise SSH.

•Use the Steghide tool to extract hidden information from an image.

•Use the ExifTool to read metadata from an image.

🔎 Initial Scan

First, we will deploy the machine with Docker and obtain the target machine’s IP address.

Deploy Machine

We will use Nmap to scan open ports and gather information about them.

The scan results show two open ports: port 22 (SSH) and port 80 (HTTP).

Initial Scan

📝 Service Investigation

We visit the website and see only an image.

Website

Since we didn’t find anything else that could help us with the machine, we’ll see if the image we found has hidden information.

🔍 Steghide Tool

So, using Steghide, a steganographic tool, we’ll discover if there is hidden information in the image.

After running the tool, we found a text file called ‘secreto.txt’, but when we read it, we found a message that indicated we should keep searching in the image.

Steghide

Secret file

📇 Exiftool

To do this, we’ll use the ExifTool to view the metadata and find something useful.

We checked the metadata and noticed that there is a username: ‘borazuwarah’.

Exiftool

💣 Exploitation

We ran Hydra with the username that we found and quickly obtained the password. It told us that it is ‘123456’.

Hydra

👊 SSH Access

Now, we’ll use the obtained credentials to try accessing the SSH.

We successfully logged into the system using the ‘borazuwarah’ user credentials.

Log in

🔑 Privilege Escalation

We checked to see if we could find anything that would help us escalate privileges and discovered that we can execute any command. So, we escalated privileges by getting a bash shell.

Find privileges

We verified and accessed as the root user.

Root user

🏁 Conclusion

During the machine’s resolution, you learn key skills in cybersecurity, such as using tools to hide and extract information, read metadata, perform brute force attacks, remotely access a system, and escalate privileges. These skills are essential for detecting and protecting systems from vulnerabilities.


← Back to Write Ups