Paper
Task 1
How many TCP ports are open on the remote host?
nmap -sS <target_ip>
Task 2
What is the domain for the Wordpress blog?
For answering this, we will attempt checking the information coming from the headers.
curl -I <target_ip>
We can se that the server is leaking information from the backend systems from the X-Backend-Server header that contains the hostname of the target IP.
Task 3
Which 2019 CVE is the wordpress version vulnerable to?
First, we need to identify the version of wordpress. First, we add the domain to the host file by sudo vim /etc/hosts
Then, we use wpscan, the WordPress security scanner, to find the version and any vulnerabilities.
We found both the readme.html file location, which usually contains the wordpress version but the specific version was already identified. With a quick google search about the specific version we find the 2019 CVE.
Task 4
What is the secret registration URL of the employee chat system?
We first need to enumerate the directories using gobuster dir.
gobuster dir -u http://office.paper/ -w <word_list>
Navigating to the index.php page we see some kind of chat system.
Going back to the CVE we previously found, this version could allow an unauthenticated user to view private or draft posts. Navigating to the page we also find this interesting post by the user Prinsonmike. Seems that we can use this wordpress vulnerability to access his draft hoping we can find this secret url.
We navigate http://office.paper/?static=1
and exploit the vulnerability and find the secret url.
Task 5
What is the name of the bot running on the Rocket Chat instance?
We need to first add to the hosts file the subdomain chat.office.paper
so the ip get resolved.
Navigating to the secret url we found on the previous task we see the registration form.
We register, and the go to the general channel where we see the name of the bot.