I booted up the image, and proceeded to do some preliminary nmap scans. I found a few services runinng:
mandreko$ nmap -sV -p1-65535 -T4 192.168.188.134 Starting Nmap 6.01 ( http://nmap.org ) at 2012-11-15 10:28 EST Nmap scan report for 192.168.188.134 Host is up (0.0077s latency). Not shown: 65511 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.8p1 Debian 7ubuntu1 (protocol 2.0) 80/tcp open http Apache httpd 2.2.20 ((Ubuntu)) 6667/tcp open irc Unreal ircd 8000/tcp open http Icecast streaming media server 21342/tcp open unknown 21768/tcp open unknown 21951/tcp open unknown 23917/tcp open unknown 24578/tcp open unknown 24783/tcp open unknown 25275/tcp open unknown 26791/tcp open unknown 31308/tcp open unknown 31418/tcp open unknown 31874/tcp open unknown 32704/tcp open unknown 33039/tcp open unknown 34466/tcp open unknown 34538/tcp open unknown 34957/tcp open unknown 36199/tcp open unknown 37213/tcp open unknown 37628/tcp open unknown 37956/tcp open unknown
Based on the clue on the Monxla page, "Hint: how big is the page you are looking at?", I connected to the webserver.
It looked like a fairly generic page, but I viewed the source, and found a huge amount of text commented out. Since it was all alpha-numeric other than ending with a single "=", I figured it was probably Base64.
I copied the text into a new file on my machine. I then decoded it and found out what type of file it was:
mandreko$ base64 -D monxla -o monxla.decoded mandreko$ file monxla.decoded monxla.decoded: PDF document, version 1.4 mandreko$ mv monxla.decoded monxla.pdf
When the PDF (available here) is then opened, it shows a report of running services that may need attacked. This is similar to "levels" in most wargames, I believe (I haven't yet finished this wargame).
My next article in this series will show how to exploit the "Bookmarks Service".
No comments:
Post a Comment