Skip to the content.

Trebek

https://underthewire.tech/trebek

Trebek 0 -> 1

Task

The goal of this level is to log into the game. Do the following in order to achieve this goal.

  1. Obtain the initial credentials via the #StartHere channel on our Slack (Link). Once you are in the channel, scroll to the top to see the credentials.

  2. After obtaining the credentials, connect to the server via SSH. You will need an SSH client such as Putty. The host that you will be connecting to is trebek.underthewire.tech, on port 22.

  3. When prompted, use the credentials for the applicable game found in the #StartHere Slack channel.

  4. You have successfully connected to the game server when your path changes to PS C:\Users\Trebek1\desktop>.

Solution

Simply use the credentials trebek1:trebek1 to login via SSH into the server:

ssh trebek1@trebek.underthewire.tech

Trebek 1 -> 2

Task

The password for trebek2 is the name of the script referenced in a deleted task as depicted in the event logs on the desktop.

NOTE: – Don’t include the file extension (i.e. - .vbs) – The password will be lowercase no matter how it appears on the screen.

IMPORTANT: Once you feel you have completed the Trebek1 challenge, start a new connection to the server, and log in with the username of Trebek2 and this password will be the answer from Trebek1. If successful, close out the Trebek1 connection and begin to solve the Trebek2 challenge. This concept is repeated over and over until you reach the end of the game.

▼ HINT: https://msdn.microsoft.com/en-us/powershell/reference/5.1/microsoft.powershell.diagnostics/get-winevent

▼ HINT: You may want to look at what data is available on a typical log containing this data…

Solution

PS C:\users\trebek1\desktop> Get-WinEvent -Path "security.evtx" | Where-Object -Property Message -Match 'deleted' | Format-Table Id, File


TimeCreated  : 5/11/2017 8:10:49 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id           : 4699
Message      : A scheduled task was deleted.

               Subject:
                Security ID:            S-1-5-21-3968311752-1263969649-2303472966-500
                Account Name:           Administrator
                Account Domain:         UNDERTHEWIRE
                Logon ID:               0x338C9

               Task Information:
                Task Name:              \Bitvise\Persistent BvSshServer Control
               Panel\S-1-5-21-3968311752-1263969649-2303472966-500
                Task Content:           <?xml version="1.0" encoding="UTF-16"?>
               <Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
                 <RegistrationInfo />
                 <Triggers>
                   <LogonTrigger>
                     <Enabled>true</Enabled>
                     <UserId>UNDERTHEWIRE\Administrator</UserId>
                   </LogonTrigger>
                 </Triggers>
                 <Principals>
                   <Principal id="Author">
                     <RunLevel>HighestAvailable</RunLevel>
                     <UserId>UNDERTHEWIRE\Administrator</UserId>
                     <LogonType>InteractiveToken</LogonType>
                   </Principal>
                 </Principals>
                 <Settings>
                   <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>
                   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
                   <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
                   <AllowHardTerminate>false</AllowHardTerminate>
                   <StartWhenAvailable>true</StartWhenAvailable>
                   <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
                   <IdleSettings>
                     <Duration>PT10M</Duration>
                     <WaitTimeout>PT1H</WaitTimeout>
                     <StopOnIdleEnd>true</StopOnIdleEnd>
                     <RestartOnIdle>false</RestartOnIdle>
                   </IdleSettings>
                   <AllowStartOnDemand>false</AllowStartOnDemand>
                   <Enabled>true</Enabled>
                   <Hidden>false</Hidden>
                   <RunOnlyIfIdle>false</RunOnlyIfIdle>
                   <WakeToRun>false</WakeToRun>
                   <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>
                   <Priority>6</Priority>
                 </Settings>
                 <Actions Context="Author">
                   <Exec>
                     <Command>C:\Program Files\Bitvise SSH Server\BssCtrl.exe</Command>
                     <Arguments>-startMinimized</Arguments>
                   </Exec>
                 </Actions>
               </Task>

...

TimeCreated  : 5/10/2017 12:08:29 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id           : 4699
Message      : A scheduled task was deleted.

               Subject:
                Security ID:            S-1-5-21-3968311752-1263969649-2303472966-1135
                Account Name:           trebek1
                Account Domain:         UNDERTHEWIRE
                Logon ID:               0x644A01

               Task Information:
                Task Name:              \cleanup mess
                Task Content:           <?xml version="1.0" encoding="UTF-16"?>
               <Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
                 <RegistrationInfo />
                 <Triggers>
                   <CalendarTrigger>
                     <StartBoundary>2017-05-10T01:00:00</StartBoundary>
                     <Enabled>true</Enabled>
                     <RandomDelay>P0DT0H0M0S</RandomDelay>
                     <ScheduleByDay>
                       <DaysInterval>1</DaysInterval>
                     </ScheduleByDay>
                   </CalendarTrigger>
                 </Triggers>
                 <Settings>
                   <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
                   <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries>
                   <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>
                   <AllowHardTerminate>true</AllowHardTerminate>
                   <StartWhenAvailable>false</StartWhenAvailable>
                   <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
                   <IdleSettings>
                     <Duration>PT10M</Duration>
                     <WaitTimeout>PT1H</WaitTimeout>
                     <StopOnIdleEnd>true</StopOnIdleEnd>
                     <RestartOnIdle>false</RestartOnIdle>
                   </IdleSettings>
                   <AllowStartOnDemand>true</AllowStartOnDemand>
                   <Enabled>true</Enabled>
                   <Hidden>false</Hidden>
                   <RunOnlyIfIdle>false</RunOnlyIfIdle>
                   <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
                   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
                   <WakeToRun>false</WakeToRun>
                   <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
                   <Priority>7</Priority>
                 </Settings>
                 <Actions Context="Author">
                   <Exec>
                     <Command>C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe</Command>
                     <Arguments>-NonInteractive -NoLogo -NoProfile -File
               'c:\users\trebek1\mess_cleaner.ps1'</Arguments>
                   </Exec>
                 </Actions>
                 <Principals>
                   <Principal id="Author">
                     <UserId>UNDERTHEWIRE\trebek1</UserId>
                     <LogonType>InteractiveToken</LogonType>
                     <RunLevel>LeastPrivilege</RunLevel>
                   </Principal>
                 </Principals>
               </Task>

Credentials: trebek2:mess_cleaner.

Trebek 2 -> 3

Task

The password for trebek3 is the name of the executable associated with the C-3PO service PLUS the name of the file on the user’s desktop.

NOTE: – Don’t include the file extension (i.e. - .exe). If the executable name is binary.exe and the file on the desktop is named 1234, the password would be binary1234. – The password will be lowercase no matter how it appears on the screen.

▼ HINT: https://technet.microsoft.com/en-us/library/ee176852.aspx

Solution

PS C:\users\trebek2\desktop> ls


    Directory: C:\users\trebek2\desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        8/30/2018  10:45 AM              0 823
PS C:\users\trebek2\desktop> Get-WmiObject win32_service | Where-Object -Property Name -like 'C-3PO'
| select PathName

PathName
--------
g:\star_wars\droid.exe

Credentials: trebek3:droid823.

Trebek 3 -> 4

Task

The password for trebek4 is the IP that the user Yoda last logged in from as depicted in the event logs on the desktop PLUS the name of the text file on the user’s desktop.

NOTE: – If the IP address is “2.3.3.2” and the file on the desktop is named “bobby”, the password would be “2.3.3.2bobby”.

▼ HINT: https://technet.microsoft.com/en-us/library/ee176852.aspx

Solution

PS C:\users\trebek3\desktop> ls


    Directory: C:\users\trebek3\desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        8/30/2018  10:46 AM              0 address
-a----        8/30/2018   5:55 AM       99684352 security.evtx
PS C:\users\trebek3\desktop> Get-WinEvent -Path "security.evtx" | Where-Object -Property Message -Mat
ch 'credential' | Where-Object -Property Message -Match 'yoda' | Format-List


TimeCreated  : 5/11/2017 8:41:10 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id           : 4648
Message      : A logon was attempted using explicit credentials.

               Subject:
                Security ID:            S-1-5-18
                Account Name:           TREBEK$
                Account Domain:         UNDERTHEWIRE
                Logon ID:               0x3E7
                Logon GUID:             {00000000-0000-0000-0000-000000000000}

               Account Whose Credentials Were Used:
                Account Name:           yoda
                Account Domain:         UNDERTHEWIRE
                Logon GUID:             {9449A69A-659C-D6F2-ED4B-53521312F225}

               Target Server:
                Target Server Name:     localhost
                Additional Information: localhost

               Process Information:
                Process ID:             0xf10
                Process Name:           C:\Windows\System32\winlogon.exe

               Network Information:
                Network Address:        10.30.1.18
                Port:                   0

               This event is generated when a process attempts to log on an account by explicitly
               specifying that accounts credentials.  This most commonly occurs in batch-type
               configurations such as scheduled tasks, or when using the RUNAS command.

TimeCreated  : 5/11/2017 8:41:08 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id           : 4776
Message      : The computer attempted to validate the credentials for an account.

               Authentication Package:  MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
               Logon Account:   yoda
               Source Workstation:      ORACLE
               Error Code:      0x0

TimeCreated  : 5/11/2017 8:41:06 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id           : 4776
Message      : The computer attempted to validate the credentials for an account.

               Authentication Package:  MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
               Logon Account:   yoda
               Source Workstation:      ORACLE
               Error Code:      0x0

trebek4:10.30.1.18address

Trebek 4 -> 5

Task

The password for trebek5 is the last execution date of Microsoft Access PLUS the name of the text file on the user’s desktop.

Note: – Format for the date is 2 digit month, 2 digit day, 4 digit year. Ex: 9 feb 2009 would be 02/09/2009. – If the date is 02/09/2009 and the file on the desktop is named _bob, the password would be 02/09/2009_bob. ▼ HINT:

https://technet.microsoft.com/en-us/library/ee176852.aspx

▼ HINT:

https://www.fireeye.com/blog/threat-research/2013/08/execute.html

Solution

Try with:

Get-WinEvent -LogName "Microsoft-Windows-Shell-Core/Operational" | Where-Object { $_.Message -like "*msaccess.exe*" } | Select-Object -First 1 TimeCreated

Now working:

Get-WinEvent : Attempted to perform an unauthorized operation.
At line:1 char:1
+ Get-WinEvent -LogName "Microsoft-Windows-Shell-Core/Operational" | Wh ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : NotSpecified: (:) [Get-WinEvent], UnauthorizedA
   ccessException
    + FullyQualifiedErrorId : System.UnauthorizedAccessException,Microsoft.Po
   werShell.Commands.GetWinEventCommand

Try with:

$path = "$env:SystemRoot\Prefetch\MSACCESS.EXE*"
Get-Item $path | Select-Object LastWriteTime

Output:

LastWriteTime
-------------
1/5/2017 6:04:00 PM

The file on the desktop:

PS C:\users\trebek4\desktop> Get-ChildItem


    Directory: C:\users\trebek4\desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        8/30/2018  10:46 AM              0 _red

Password: 01/05/2017_red.

Trebek 5 -> 6

Task

The password for trebek6 is the name of the executable that is starting at 3/23/2017 8:08:53 PM via the Software Protection service as depicted in the event log on the desktop.

NOTE: – Don’t include the file extension (i.e. - .exe). – The password will be lowercase no matter how it appears on the screen.

Solution

Trebek 6 -> 7

Task

Solution

Trebek 7 -> 8

Task

Solution

Trebek 8 -> 9

Task

Solution

Trebek 9 -> 10

Task

Solution

Trebek 10 -> 11

Task

Solution

Trebek 11 -> 12

Task

Solution

Trebek 12 -> 13

Task

Solution

Trebek 13 -> 14

Task

Solution

Trebek 14 -> 15

Task

Solution