My first Hack The Box Moncton Meetup.
Blue from HTB is an easy Windows-based hacking challenge released on July 28, 2017, built around the EternalBlue exploit. The exploit was created by the National Security Agency (NSA) and later leaked by hackers in April. This exploit was used by the ransomware WannaCry and NotPetya, both released in May 2017 and June 2017, respectively. This highlights the importance of staying up to date with software patches, as older systems are more susceptible to attacks.
EternalBlue was still causing vulnerabilities in 2018, and the last documented attack using it was the Baltimore cyberattack. This exploit exists in the SMBv1 server of various Windows versions and allows attackers to execute arbitrary code by mishandling specially crafted packets. This attack shows the importance of updating software regularly, as it allowed for complete control over the system. The cost of these attacks in terms of damages to the victims is in the billions.\
Antique is an easy Linux box created by MrR3boot and released on September 27th, 2021. However, it is actually an IoT device designed to print on paper, rather than a Linux computer. The box is meant to challenge the enumeration skills of the user, by finding the flaw in the printer. Most people own a printer, but not everyone updates the firmware, making it a potentially vulnerable device.
To complete the Antique Walkthrough, the user will need solid Linux enumeration skills, experience with making SNMP queries, decoding a string, some knowledge of Python, an understanding of how printers work, and good GoogleFu skills. The tools required for this walkthrough include nmap, snmpwalk, python, CyberChef, CUPS, and chisel. The initial nmap scan will give limited information, but the user can launch another scan that checks every single port to see if anything was missed. Once the SNMP server is found, the user can use snmpwalk to get more information. With a search on Google, the user will find a blog explaining that they can send an SNMP query to the printer to get its password. After converting the hex string received, the user will be able to log in to the telnet server and run commands on the system.
Comments