The platform develops virtual
classrooms that not only allow users to deploy training environments with the
click of a button, but also reinforce learning by adding a question-answer
approach. Its a comfortable experience to learn using pre-designed courses which include virtual machines (VM) hosted in the cloud.
TryHackMe Advent of Cyber 2 Day 3 Walkthrough
While using a question-answer model
does make learning easier, TryHackMe allows users to create their own virtual
classrooms to teach particular topics enabling them to become teachers. This
not only provides other users with rich and varied content, but also helps creators reinforce their understanding of fundamental concepts.
Room :-
https://tryhackme.com/room/adventofcyber2
Advent of Cyber 2
Get started with Cyber Security in 25 Days - Learn the basics by doing a
new, beginner friendly security challenge every day leading up to Christmas.
Task 8 [Day 3] Web Exploitation Christmas Chaos
McSkidy is walking down the corridor and hears a faint bleeping noise,
Beep.... Beep.... Beep... as McSkidy gets closer to Sleigh Engineering Room
the faint noise gets louder and louder.. BEEP.... BEEP.... Something is
clearly wrong! McSkidy runs to the room, slamming open the door to see Santa's
sleighs control panel lite up in red error messages! "Santa sleigh! It's been
hacked, code red.. code red!" he screams as he runs back to the elf security
command center.
Can you help McSkidy and his team hack into Santa's
Sleigh to re-gain control?
Learning Objectives
- Understanding Authentication
- Understand the use of default credentials and why they're dangerous
- Bypass a login form using BurpSuite
Authentication
Authentication is a process of verifying a users' identity, normally by
credentials (such as a username, user id or password); to put simply,
authentication involves checking that somebody really is who they claim to be.
Authorization (which is fundamentally different to authentication, but often
used interchangeably) determines what a user can and can't access;
authorization is covered in tomorrow walkthrough, today's task focuses on
authentication and some common flaws.
TryHackMe Advent of Cyber 2 Day 3 Walkthrough
Authorization vs Authentication
Authentication and authorization might sound similar, but they are distinct
security processes in the world of identity and access management (IAM).
Authentication confirms that users are who they say they are. Authorization
gives those users permission to access a resource.
Default Credentials
You've probably purchased (or downloaded a service/program) that
provides you with a set of credentials at the start and requires you to change
the password after it's set up (usually these credentials that are provided at
the start are the same for every device/every copy of the software). The
trouble with this is that if it's not changed, an attacker can look up (or
even guess) the credentials.
What's even worse is that these
devices are often exposed to the internet, potentially allowing anyone to
access and control it. In 2018 it was reported that a botnet (a number of
internet-connected devices controlled by an attacker to typically perform DDoS
attacks) called Mirai took advantage of Internet of Things (IoT) devices by
remotely logging, configuring the device to perform malicious attacks at the
control of the attackers; the Mirai botnet infected over 600,000 IoT devices
mostly by scanning the internet and using default credentials to gain
access.
In fact, companies such as Starbucks and the US Department
of Defense have been victim to leaving services running with default
credentials, and bug hunters have been rewarded for reporting these very
simple issues responsibly (Starbucks paid $250 for the reported issue):
https://hackerone.com/reports/195163
- Starbucks, bug bounty for default credentials.
https://hackerone.com/reports/804548
- US Dept Of Defense, admin access via default credentials.
In
2017, it was
reported that 15% of all IoT devices still use default passwords.
SecLists
is a collection of common lists including usernames, passwords, URLs and much
more. A password list known as "rockyou.txt" is commonly used in security
challenges, and should definitely be a part of your security toolkit.
Dictionary
Attacks using BurpSuite
A dictionary attack is a method of breaking
into an authenticated system by iterating through a list of credentials. If
you have a list of default (or the most common) usernames and passwords, you
can loop through each of them in hopes that one of the combinations is
successful.
You can use a number of tools to perform a dictionary
attack, one notable one being Hydra (a fast network logon cracker) and
BurpSuite, an industry-standard tool used for web application penetration
testing. Given day 3 is about web exploitation, we'll show you how to use
BurpSuite to perform a dictionary attack on a web login form.
To
download BurpSuite
click here, otherwise, BurpSuite is pre-installed on our web-based AttackBox.
1. Start BurpSuite, you can do this on the AttackBox by clicking
BurpSuite logo in the icon tray.
2. Once this has loaded, you want to "Intercept" your traffic by
proxying it through the BurpSuite, which will then forward the request to the
intended destination (in our case it will be a website) This will give you the
ability to analyse and modify your browsers traffic.
1) This example uses the AttackBox, and makes proxying traffic to
BurpSuite easy (if you're using BurpSuite on your own machine, click here) to
see how to proxy traffic to BurpSuite). On the AttackBox, open Firefox, click
on the FoxyProxy browser extension, and select "Burp" - this will now proxy
your traffic to BurpSuite.
2) Go to the BurpSuite application and click the Proxy tab, then click
the button "Intercept is on".
3) Navigate to your chosen
website, as you're intercepting your traffic, you will see BurpSuite has held
your request and will not forward it on until you tell it to. Let's go to our
web application and submit your details into a given form, in our case its a
generic login form.
4) This captured request will show up in the Proxy tab.
Right-click it, and click "Send to Intruder"; BurpSuite has a lot of
functionality to repeat modify and manipulate requests, Burp Intruder is a
tool to automate customize web attacks. We will use intruder to loop through
and submit a login request using a list of default credential, in the hopes
that one of the usernames and passwords in the list is correct.
5) Go to the Intruder tab, you should see your request. Here we will
insert "positions" (telling Burp which fields to update when automating a
request), select a list per position and start the attack.
i)
Click the "Positions" tab, and clear the pre-selected positions.
ii)
Add the username and password values as positions (highlight the text and
click "Add")
iii) Select "Cluster Bomb" in the Attack
type dropdown menu; this attack type iterates through each payloads sets in
turn, so every combination of each set is tested.
6) We're going to tell each "Position" which Payload to use. In our
example, we will select a list of usernames for the username field and a list
of passwords for the password field.
i) Click
the "Payloads" tab, select your Payload set (set 1 is the username field, set
2 is the password field) and add select your list in the "Payload Options"
section (or manually add entries).
ii) For set 1
(username), we will add a few common default username entries such as "admin",
"root" and "user"
iii) For set 2 (password), we will add a few common default passwords
such as "password", "admin" and "12345"
7) Click the "Start Attack" button, this will loop through each
position list in every combination. You can sort by the "Length" or "Status"
to identify a successful login (typically all incorrect logins will have the
same status or length, if a combination is correct it will be different.
Use
what you've learnt to help McSkidy hack back into the Santa Sleigh Tracker!
1) Use BurpSuite to brute force the login form. Use the following
lists for the default credentials:
Use the correct credentials to log in to the Santa Sleigh Tracker app. Don't
forget to turn off Foxyproxy once BurpSuite has finished the attack!
What is the flag?
Ans :- THM{885ffab980e049847516f9d8fe99ad1a}
See you soon, with another task N day. So till then bookmark our website
Disclaimer
This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing malicious or damaging attacks. Performing any hacks without written permission is illegal ..!
All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)
0 comments:
Post a Comment
For Any Tech Updates, Hacking News, Internet, Computer, Technology and related to IT Field Articles Follow Our Blog.