{"id":86,"date":"2021-07-03T21:46:00","date_gmt":"2021-07-03T21:46:00","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=86"},"modified":"2025-12-13T21:47:10","modified_gmt":"2025-12-13T21:47:10","slug":"pokemon-tryhackme-lab","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=86","title":{"rendered":"Pokemon- TryHackMe lab"},"content":{"rendered":"\n<p class=\"has-text-align-center\">oday I am working on the Gotta Catch&#8217;em All challenge from <a href=\"https:\/\/tryhackme.com\">TryHackMe.com<\/a>.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Getting help from:&nbsp;<a href=\"https:\/\/medium.com\/@aritrachakraborty_74303\/gotta-catchem-all-a-writeup-for-ctf-style-thm-box-but-with-generic-techniques-904dc58e3890\">https:\/\/medium.com\/@aritrachakraborty_74303\/gotta-catchem-all-a-writeup-for-ctf-style-thm-box-but-with-generic-techniques-904dc58e3890<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>I got the IP address of the box and started with an Nmap scan:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/nmap-1024x441.png\" alt=\"\" class=\"wp-image-4796\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\">Next, I wanted to see what was open on port 80. I noticed the&nbsp; http-title was &#8220;Can You Find Them All?&#8221;.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/apache-1024x510.png\" alt=\"\" class=\"wp-image-4798\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">It looks like a default Apache page, but with that http-title, I figured something was here. Next I looked at the page source:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/Creds.png\" alt=\"\" class=\"wp-image-4799\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Found credentials in the source and decided to try them with ssh as port 22 was open.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/shell-1024x654.png\" alt=\"\" class=\"wp-image-4800\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Checked the home folder with: ls -lAh<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/ls1-1024x829.png\" alt=\"\" class=\"wp-image-4801\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Then running: ls -lAh *<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/ls2-1024x887.png\" alt=\"\" class=\"wp-image-4802\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Next I went into the Desktop directory and started a python web server to grab that .zip file<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/python.png\" alt=\"\" class=\"wp-image-4803\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Manually grabbed the .zip, could have used wget: wget 10.10.238.31:8000\/P0kEmOn.zip<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/file-700x1024.png\" alt=\"\" class=\"wp-image-4804\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">I unzipped this file and got a text file, I ran the cat command to read the contents<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/cat1-1024x59.png\" alt=\"\" class=\"wp-image-4805\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">This file has hex code in it, I used cyberchef to decode the message:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/hex-1024x735.png\" alt=\"\" class=\"wp-image-4806\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Got the first flag!<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/morecreds-1024x176.png\" alt=\"\" class=\"wp-image-4807\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">After this, I found more credentials in another file<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/ash-1024x211.png\" alt=\"\" class=\"wp-image-4808\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Logged into Ash&#8217;s account<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/rootpokemon.png\" alt=\"\" class=\"wp-image-4809\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">I found the next flag, roots favorite Pok\u00e9mon.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Next I searched for &#8220;fire&#8221; to get the last flag: find \/ -name &#8216;*fire*&#8217; -type f 2&gt;\/dev\/null (Too many results)<\/p>\n\n\n\n<p class=\"has-text-align-center\">find \/ -name &#8216;*fire*&#8217; -type f 2&gt;\/dev\/null | grep -ivE &#8220;(firefox|firewall)&#8221;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/fire.png\" alt=\"\" class=\"wp-image-4810\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Now that file looks interesting&#8230;<\/p>\n\n\n\n<p class=\"has-text-align-center\">I decode the Base64: cat \/etc\/why_am_i_here?\/fire-type.txt | base64 -d<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/fire2-1024x75.png\" alt=\"\" class=\"wp-image-4811\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Got the next flag<\/p>\n\n\n\n<p class=\"has-text-align-center\">Next I looked in the web servers directory to see if any interesting files are there, I found the file below with some Rot13 inside.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/water.png\" alt=\"\" class=\"wp-image-4812\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Time to put this in cyberchef to get the flag<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2021\/07\/lastchef-1024x778.png\" alt=\"\" class=\"wp-image-4813\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">The output provided me with the last flag, this was a fun challenge!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>oday I am working on the Gotta Catch&#8217;em All challenge from TryHackMe.com. Getting help from:&nbsp;https:\/\/medium.com\/@aritrachakraborty_74303\/gotta-catchem-all-a-writeup-for-ctf-style-thm-box-but-with-generic-techniques-904dc58e3890 I got the IP address of the box and started with an Nmap scan: Next, I wanted to see what was open on port 80. I noticed the&nbsp; http-title was &#8220;Can You Find Them All?&#8221;. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-86","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/86","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=86"}],"version-history":[{"count":1,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/86\/revisions"}],"predecessor-version":[{"id":87,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/86\/revisions\/87"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=86"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=86"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}