πRabbit Hole
License
The following post by anthonyjsaab is licensed under CC BY 4.0
0 - Introduction
Link to room: https://tryhackme.com/r/room/rabbitholeqq
Machine version: RabbitHole v1.3
This writeup walks you through a room on TryHackMe created by shamollash
1 - Port Scan
1a - Discovery
βββ(kaliγΏkali)-[~]
ββ$ sudo nmap -T4 -p- rabbit.thm
[sudo] password for kali:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-25 21:53 EEST
Nmap scan report for rabbit.thm (10.10.45.20)
Host is up (0.096s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 723.03 seconds1b - Versioning and OS fingerprinting
1c - Vulners
2 - Web server probing
2a - Inspection



Note that dirbusting does not uncover any hidden pages.
2b - Normal user interaction


2c - Attempting XSS
When we logged in, the username of the admin was echoed on our webpage. Additionally, the admin appears to login every minute. If their landing page is the same as ours, and they are listed all the users and their last logins, an XSS attempt could let us steal their cookie.
After spinning up an HTTP server on our Kali machine, we will try to register using the following payload as a username:
After logging in, we receive our own cookie:
This means that our payload was stored correctly and is correctly rendering on a browser.
We wait a bit for the admin to login again and trigger the payload on their browser. Unfortunately, after multiple minutes, no request was received on our HTTP server. We can confirm that the admin was logging in during our waiting by refreshing and seeing their attempts:

2d - SQLi
In the above image, we can see that our payload triggered an SQL error message to be displayed. This is a clear indication that the target is vulnerable to SQLi.
However, since "anti-bruteforce" measures are in place, we will avoid using sqlmap and will instead be doing everything manually.
2di - Enumerating how many columns needed for successful UNION with previous SQL statement


2dii - Enumerating tables
2diii - users table




After some more enumeration, here is the list of hashes we get:
Here are the cracking results:

Trying to crack the first MD5 hash using rockyou.txt did not yield anything. Logging in using foo or bar does not give us anything good.
The passwords of foo and bar seem to indicate that we are in a rabbit hole.
Last updated
Was this helpful?