Corridor

Pasted image 20241202160801.png|300


Info about Corridor

Can you escape the Corridor?


Active reconnaissance

Port scan

Executing a fast general scan to all ports.

sudo nmap TARGET_IP -n -p- -sS -Pn -vvv --open --min-rate 5000 -oN nmap_scan
PORT   STATE SERVICE REASON
80/tcp open  http    syn-ack ttl 60

Enumeration

Executing a deep scan with common scripts only to ports that we are interested.

sudo nmap TARGET_IP -sCV -p 80 -oN nmap_enum

OS

Port 80 - Werkzeug

tcp http Werkzeug httpd 2.0.3 (Python 3.10.2)
Add the IP to /etc/hosts

sudo echo "10.10.197.203 corridor.thm" | sudo tee -a /etc/hosts

Pasted image 20241202162327.png|400
Each door it's a "coded" url, I'm usign burpsuite
Pasted image 20241202165410.png
Except for the different url, all pages are cloned


Exploitation

Understanding the codes

Using hashid it's probably a md5
Save all hashes in a file named hashes
Pasted image 20241202173128.png|300
Try to crack with MD5 and works.
Pasted image 20241202173034.png|500
Create a file of hashes from the big.txt to try fuzzing

cat -p /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt | while read line; do echo -n "$line" | md5sum; done | awk '{print $1}' > big_md5

Fuzz

Fuzzing using the file generated big_md5

ffuf -c -t 100 -u http://corridor.thm/FUZZ -w big_md5 -mc all -fc 404

I found a hash that is not part of the 13 from the site
Pasted image 20241202205713.png|600

User flag

Access with burpsuite or curl
Pasted image 20241202210542.png