🪟Blue Room TryHackMe
Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
Introduction
In this room we are going to learn about eternal blue exploit.
EternalBlue is a computer exploit developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on April 14, 2017, one month after Microsoft released patches for the vulnerability.
On May 12, 2017, the worldwide WannaCry ransomware used this exploit to attack unpatched computers. On June 27, 2017, the exploit was again used to help carry out the 2017 NotPetya cyberattack on more unpatched computers.
EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE-2017-0144 in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially crafted packets from remote attackers, allowing them to remotely execute code on the target computer. Source: Wikipedia
Blue Room TryHackMe
Room Initial View

Room Tasks

The Room has 5 tasks to be solved. Task 1: Recon Task 2: Gain Access Task 3: Escalate Task 4: Cracking Task 5: Find Flags!
Lets start the machine and complete the tasks.
Task 1: Recon

lets take a look at the questions from task 1

now to get the answers for this questions we need to scan the target machine ip with Nmap.
Scanning the target
I opened the attack box and started the Nmap scan.
root@attack-box:~# nmap -A -sV -script vuln [target-ip]
Scan result from Nmap
root@attack-box:~# nmap -A -sV -script vuln [target-ip]
Starting Nmap 7.60 ( https://nmap.org ) at yyyy-mm-dd hh:mm GMT
Nmap scan report for attack-box
Host is up (0.00044s latency).
Not shown: 991 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open ms-wbt-server Microsoft Terminal Service
| rdp-vuln-ms12-020:
| VULNERABLE:
| MS12-020 Remote Desktop Protocol Denial Of Service Vulnerability
| State: VULNERABLE
| IDs: CVE:CVE-2012-0152
| Risk factor: Medium CVSSv2: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P)
| Remote Desktop Protocol vulnerability that could allow remote attackers to cause a denial of service.
|
| Disclosure date: 2012-03-13
| References:
| http://technet.microsoft.com/en-us/security/bulletin/ms12-020
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0152
|
| MS12-020 Remote Desktop Protocol Remote Code Execution Vulnerability
| State: VULNERABLE
| IDs: CVE:CVE-2012-0002
| Risk factor: High CVSSv2: 9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C)
| Remote Desktop Protocol vulnerability that could allow remote attackers to execute arbitrary code on the targeted system.
|
| Disclosure date: 2012-03-13
| References:
| http://technet.microsoft.com/en-us/security/bulletin/ms12-020
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0002
|_sslv2-drown:
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49158/tcp open msrpc Microsoft Windows RPC
49160/tcp open msrpc Microsoft Windows RPC
MAC Address: 02:B4:F6:22:77:31 (Unknown)
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
Network Distance: 1 hop
Service Info: Host: JON-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED
| smb-vuln-ms17-010:
| VULNERABLE:
| Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
| State: VULNERABLE
| IDs: CVE:CVE-2017-0143
| Risk factor: HIGH
| A critical remote code execution vulnerability exists in Microsoft SMBv1
| servers (ms17-010).
|
| Disclosure date: 2017-03-14
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
| https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
|_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
TRACEROUTE
HOP RTT ADDRESS
1 0.44 ms attack-box
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 169.88 seconds
now with this scan we found the how many ports are open and also the vulnerability's in the machine given.
Now with the information gathered we can answer all the questions in Task 1

Task 2: Gain Access

In Task 2 to get the answers we need to use Metasploit.
Lets start metasploits

after the Metasploit has open'd search for 'ms17-010' since we found that the vulnerability from Nmap scan.

Lets check the options and use the exploit

Set RHOST to the target machine ip

Now we exploit and wait for the exploit to finish.

Exploit completed and succesful.

Some times the exploit might fail but just run it again or restart the machine.
my exploit was success and even the meterpreter session was created.
now type shell to open cmd of the victim.

if you are running from kali VM make sure to set LHOST as tun0.

now with the information gathered we can answer all the questions present in task 2

Task 3: Escalate
Let's take a look at the questions from task 3

Task 4: Cracking
lets taka look at the questions from task 4


to crack the hashes we use john with rockyou.txt as the wordlist
if this is your first time using the rockyou.txt wordlist you need to first unzip it and then use it

make sure that only the username and the hash are present in the hash file

now run john against the hash's we get the password in plain text.

now with the information gathered we can answer all the questions present in task 4.

Task 5: Find Flags!
now to find the flags we go to the starting of the directory and search for the file name with flag
dir *flag*.txt /s

now we found the locations of the flags.
submit the flags and enjoy your new blue batch when completed.

Until next time...
Last updated
Was this helpful?