Anthem by Chevalier
IP = 10.10.220.204*
Difficulty: Easy
Machine OS: Windows
Learning Platform: tryhackme.com
Finished on: Arch Linux
*Note: IP address may vary.
Reconnaissance
Scoping and Preparation
-
Connect to OpenVPN Server using:
sudo openvpn {PATH_TO_OVPN_FILE} -
I used my tool CTFRecon to automate directory creation, network scanning, web directory brute-forcing and adding entry to
/etc/hostsfile. -
To use CTFRecon:
1. git clone https://www.github.com/hambyhacks/CTFrecon 2. cd CTFRecon 3. chmod +x ctfrecon.sh && cp ctfrecon.sh ../ #to move ctfrecon.sh to your working directory. 4. sudo ./ctfrecon.sh [IP] [DIRECTORY NAME] [PLATFORM] [WORDLIST] #platform refers to hackthebox(htb) or tryhackme(thm). Wordlist is used for GoBuster directory brute-forcing.
Preliminary Enumeration via nmap
Table 1.1: nmap Results Summary
| PORT | STATUS | SERVICE | VERSION |
|---|---|---|---|
| 80/tcp | open | http | Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |
| 3389/tcp | open | ms-wbt-server | Microsoft Terminal Services |

Machine OS: Based on nmap results, it is a Windows OS machine.
Enumeration
Manual Web Enumeration
- Looking at the webpage at port 80, we are greeted by this webpage below.

- We can also look at the web technologies used in
anthem.thmusing Wappalyzer.

- We also tried to check if there is a file named
robots.txt.

- We got some directories and a password-looking string:
UmbracoIsTheBest!
Note: Manual Enumeration is important.
- We try to check pages in the web server and we get some information about the email format of
anthem.comby looking at the posts done byJane Doeuser.

- We also check the other post which the contents describe their
adminin a poem. So we tried to search it through google.


- Nice! we got some information about
adminuser!
Tip: When in doubt, search it in Google.
Table 1.2: Credentials
| Username | Password |
|---|---|
| sg@anthem.com | UmbracoIsTheBest! |
Exploitation
Steps to reproduce:
-
Navigate to
/umbracodirectory in web server which is a login page using gathered credentials.
-
You should be logged in as
SGwhich is an administrator account.
-
Login via RDP (Remote Desktop Protocol) using
xfreerdp.Syntax:
xfreerdp /u:{USERNAME} /p:{PASSWORD} /v:{IP:PORT}
-
You should be logged in as
SGvia RDP.
Privilege Escalation / Post-Exploitation
Internal Enumeration
Table 1.3: Checklist for Windows Internal Enumeration
| COMMAND | DESCRIPTION |
|---|---|
whoami |
gets current user name |
whoami /priv |
gets privileges granted on user |
net users |
lists all users in the machine. |
Notes: This is not a complete list. To see more detailed list, refer to this.
Tip: When nothing else makes sense, try to use LinPEAS (winPEAS for windows machines.).
-
We can see the
user.txtfile hanging in the desktop ofSGuser.Double-Clickto open the file or if you want do to it in the terminal:Syntax:
cd C:\Users\SG\Desktopthentype user.txt
Vertical Privilege Escalation
-
We can try to list all directories in
C:\by using:Syntax:
cd C:\thendir /a
-
Run powershell.

-
Let’s check if there is another user in the machine.
Syntax:
net users
-
There is a directory named
backup. Let’s look what are the contents and who owns that directory.Syntax:
dir C:\backup | Get-AclExplanation:
runs powershell and check access lists control for C:\backup directory
-
We tried to get the content of
restore.txtand we dont have access. SinceSGis the owner of file. We can try to change the access permission of that file./edenotes edit the permission but do not add new permission./pdenotes to add permission.fmeans full control.
Syntax:
cacls {FILE/DIR} /e /p {USER}:{ACCESS} -
Getting the contents of the
restore.txtfile gives us a password like string. -
Let’s try to escalate our privileges by using the
runascommand.Syntax:
runas /user:{USERNAME} {COMMAND}
-
We got admin command prompt!


STATUS: ROOTED
The next two steps are not necessary for completion of the machine but it completes the 5 Phases of Penetration Testing.
Post Exploitation / Maintaining Access
- Added another administator user for easy access.
Clearing Tracks
- Removed all logs and footprints to to prevent risk of exposure of breach to security administrator.
Status: Finished
Feel free to reach out and if there is something wrong about the above post. Feedbacks are also appreciated :D
Donation Box
Not required but appreciated :D
<– Go Back
