Jasper Alblas
Jasper Alblas
It is time to look at the Anthem box on TryHackMe, a beginner level box containing a Windows machine that is asking to be exploited.
Box URL: https://tryhackme.com/r/room/anthem
I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM. Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.
Alright, let’s get started!
Once more into the fray. Let’s start up your AttackBox or if you prefer connect to the machine by using OpenVPN, using the following command:
sudo openvpn <file_name>.ovpn
As always, to find out the open ports we can use Nmap. Use the following command:
nmap -sV -sC -v <target ip>
The argument –sV does version detection, –sC runs some basic scripts, while -v adds some more logging. This should be enough to get started.
We found two open ports, but no answer is needed here, so let’s move on!
Answer: No answer needed
One of the open ports is port 80, which is the default port used to send and receive unencrypted web pages.
Answer: 80
The other open port is port 3389, which is the default port used for Windows Remote Desktop and Remote Assistance connections.
Answer: 3389
Let’s start by looking around on the website. Open the site in your favorite browser. We will be met by a blog called Anthem:
It seems like a pretty standard default blog.
But if we click on the author we find the author page which shows a flag:
If you move to flag 3, you can “hand in” this flag as flag number 3.
The source code looks regular as well, but let’s have a look at the sitemap.xml file and robots.txt file, files which often can show us hidden files and folders.
The sitemap.xml file does not give us much:
Let’s have a look at the robots.txt file:
We hit the jackpot here! Not only do we find some additional paths to explore, but we also get a hint about the kind of CMS used (Umbraco) and something sounds like a password!
Answer: UmbracoIsTheBest!
The next one is easy to anwer as well. We figure out that the CMS running on the webpage is Umbraco.
We did find info on the CMS in a very uncommon way. Normally this would be found by using a directory enumeration tool such as gobuster, or we could use a tools such as Wappalyzer to find information:
Here we found that the server is IIS on a Windows host.
But anyway, the answer is as follows:
Answer: umbraco
These next couple of questions are quick to answer. We found the domain earlier as part of the title of the page, and by looking at the email account as well.
Answer: anthem.com
Remember the previously found author page?
Surely, the name must be Jane Doe. But no! Surely we must find another name.
I found another page with a poem:
I tried entering James Orchard Halliwell, but this also did not work. After some searching around I have to give up and had to use the hint here. You apparently have to find the name of the poem above.
https://en.wikipedia.org/wiki/Solomon_Grundy_(nursery_rhyme)
This did not make much sense to me, but hey, we can move on.
Answer: Solomon Grundy
Now that we know Solomon Grundy is the admin, we can take a guess at the email address. Since Jane Doe’s email address was JD@anthem.com, we could try SG@anthem.com. Yay, it worked!
Answer: SG@anthem.com
Let’s move on. It is time to start hunting for some flags!
Let’s look at that Umbraco subdirectory we found earlier:
We could try logging in now with the found info. We know the administrator email address now, as well as a possible password.
Let’s try with SG@anthem.com and UmbracoIsTheBest! as password.
And sure enough, we got into the Umbraco backend:
I looked around for a while, and finally found a flag on the Content menu, in the content manager of the “We are hiring” post. Look at the “Meta Tags” tab:
Answer: THM{L0L_WH0_US3S_M3T4}
This is getting difficult to find. The hints says we can search for it. Sohave a look at the search field in the menu.
First I thought about searching for THM{ but that did not work. Actually, it is a part of the placeholder value on the HTML input element:
Answer: THM{G!T_G00D}
We found this earlier, on the We are hiring frontend page.
Answer: THM{L0L_WH0_D15}
The hint asks us if we have looked at all pages yet. So, we have to take another look around. I finally found it in the meta tags section of the other blog post:
Answer: THM{AN0TH3R_M3TA}
We are in the endgame now. Let’s battle on!
We should try to login on the system. We ca nuse Remmina for this. Let’s try logging on with the previously found credentials:
We got in!
The user.txt file is right there on the desktop. Open it and you will find the flag.
Answer: THM{N00T_NO0T}
Now, all we need it the root flag. The hint mentions that we should have a look at hidden files/folders, so open the View tab and check “Hidden Items”.
After some exploring I found an interesting backup folder on the C drive.
But darn it, we do not have the right permissions.
Let’s have a look at the security settings. Do so by right clicking the file, pressing Properties, and go into the Security tab.
Press edit to change permissions.
Press add to add a user. Let’s try and add permissions the SG user. Write SG in the text field, and press Check Names.
Press OK.
And finally press Apply.
Now we should be able to open the text file and find the password:
Answer: ChangeMeBaby1MoreTime
Now we could choose to switch user, but we can just as well enter the Administrator credentials when trying to open its home directory (C:/Users/Administrator). Do so when prompted:
Take a look at the Desktop, and you will find the final flag:
Just open it 🙂
Answer: THM{Y0U_4R3_1337}
Thanks for reading this walkthrough on the TryHackMe: Anthem room!
This was a quick and easy box. It was quite fun in my opinion, although I did not like finding the SG username part. But hey, we got through it! See you next time!
You are welcome to comment on this article, and please share with friends!
I would be even more grateful if you support me by buying me a cup of coffee:
I learned a lot through HackTheBox’s Academy. If you want to sign up, you can get extra cubes, and support me in the process, if you use the following link:
https://referral.hackthebox.com/mzwwXlg
Happy Hacking!