Trebek
https://underthewire.tech/trebek
Trebek 0 -> 1
Task
The goal of this level is to log into the game. Do the following in order to achieve this goal.
-
Obtain the initial credentials via the
#StartHere
channel on our Slack (Link). Once you are in the channel, scroll to the top to see the credentials. -
After obtaining the credentials, connect to the server via SSH. You will need an SSH client such as Putty. The host that you will be connecting to is
trebek.underthewire.tech
, on port22
. -
When prompted, use the credentials for the applicable game found in the
#StartHere
Slack channel. -
You have successfully connected to the game server when your path changes to
PS C:\Users\Trebek1\desktop>
.
Solution
Simply use the credentials trebek1:trebek1
to login via SSH into the server:
ssh trebek1@trebek.underthewire.tech
Trebek 1 -> 2
Task
The password for trebek2
is the name of the script referenced in a deleted task as depicted in the event logs on the desktop.
NOTE:
– Don’t include the file extension (i.e. - .vbs
)
– The password will be lowercase no matter how it appears on the screen.
IMPORTANT:
Once you feel you have completed the Trebek1
challenge, start a new connection to the server, and log in with the username of Trebek2
and this password will be the answer from Trebek1
. If successful, close out the Trebek1
connection and begin to solve the Trebek2
challenge. This concept is repeated over and over until you reach the end of the game.
▼ HINT: https://msdn.microsoft.com/en-us/powershell/reference/5.1/microsoft.powershell.diagnostics/get-winevent
▼ HINT: You may want to look at what data is available on a typical log containing this data…
Solution
PS C:\users\trebek1\desktop> Get-WinEvent -Path "security.evtx" | Where-Object -Property Message -Match 'deleted' | Format-Table Id, File
TimeCreated : 5/11/2017 8:10:49 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id : 4699
Message : A scheduled task was deleted.
Subject:
Security ID: S-1-5-21-3968311752-1263969649-2303472966-500
Account Name: Administrator
Account Domain: UNDERTHEWIRE
Logon ID: 0x338C9
Task Information:
Task Name: \Bitvise\Persistent BvSshServer Control
Panel\S-1-5-21-3968311752-1263969649-2303472966-500
Task Content: <?xml version="1.0" encoding="UTF-16"?>
<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo />
<Triggers>
<LogonTrigger>
<Enabled>true</Enabled>
<UserId>UNDERTHEWIRE\Administrator</UserId>
</LogonTrigger>
</Triggers>
<Principals>
<Principal id="Author">
<RunLevel>HighestAvailable</RunLevel>
<UserId>UNDERTHEWIRE\Administrator</UserId>
<LogonType>InteractiveToken</LogonType>
</Principal>
</Principals>
<Settings>
<MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
<AllowHardTerminate>false</AllowHardTerminate>
<StartWhenAvailable>true</StartWhenAvailable>
<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
<IdleSettings>
<Duration>PT10M</Duration>
<WaitTimeout>PT1H</WaitTimeout>
<StopOnIdleEnd>true</StopOnIdleEnd>
<RestartOnIdle>false</RestartOnIdle>
</IdleSettings>
<AllowStartOnDemand>false</AllowStartOnDemand>
<Enabled>true</Enabled>
<Hidden>false</Hidden>
<RunOnlyIfIdle>false</RunOnlyIfIdle>
<WakeToRun>false</WakeToRun>
<ExecutionTimeLimit>PT0S</ExecutionTimeLimit>
<Priority>6</Priority>
</Settings>
<Actions Context="Author">
<Exec>
<Command>C:\Program Files\Bitvise SSH Server\BssCtrl.exe</Command>
<Arguments>-startMinimized</Arguments>
</Exec>
</Actions>
</Task>
...
TimeCreated : 5/10/2017 12:08:29 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id : 4699
Message : A scheduled task was deleted.
Subject:
Security ID: S-1-5-21-3968311752-1263969649-2303472966-1135
Account Name: trebek1
Account Domain: UNDERTHEWIRE
Logon ID: 0x644A01
Task Information:
Task Name: \cleanup mess
Task Content: <?xml version="1.0" encoding="UTF-16"?>
<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo />
<Triggers>
<CalendarTrigger>
<StartBoundary>2017-05-10T01:00:00</StartBoundary>
<Enabled>true</Enabled>
<RandomDelay>P0DT0H0M0S</RandomDelay>
<ScheduleByDay>
<DaysInterval>1</DaysInterval>
</ScheduleByDay>
</CalendarTrigger>
</Triggers>
<Settings>
<MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>
<AllowHardTerminate>true</AllowHardTerminate>
<StartWhenAvailable>false</StartWhenAvailable>
<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
<IdleSettings>
<Duration>PT10M</Duration>
<WaitTimeout>PT1H</WaitTimeout>
<StopOnIdleEnd>true</StopOnIdleEnd>
<RestartOnIdle>false</RestartOnIdle>
</IdleSettings>
<AllowStartOnDemand>true</AllowStartOnDemand>
<Enabled>true</Enabled>
<Hidden>false</Hidden>
<RunOnlyIfIdle>false</RunOnlyIfIdle>
<DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
<UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
<WakeToRun>false</WakeToRun>
<ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
<Priority>7</Priority>
</Settings>
<Actions Context="Author">
<Exec>
<Command>C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe</Command>
<Arguments>-NonInteractive -NoLogo -NoProfile -File
'c:\users\trebek1\mess_cleaner.ps1'</Arguments>
</Exec>
</Actions>
<Principals>
<Principal id="Author">
<UserId>UNDERTHEWIRE\trebek1</UserId>
<LogonType>InteractiveToken</LogonType>
<RunLevel>LeastPrivilege</RunLevel>
</Principal>
</Principals>
</Task>
Credentials: trebek2:mess_cleaner
.
Trebek 2 -> 3
Task
The password for trebek3
is the name of the executable associated with the C-3PO
service PLUS the name of the file on the user’s desktop
.
NOTE:
– Don’t include the file extension (i.e. - .exe
). If the executable name is binary.exe
and the file on the desktop
is named 1234
, the password would be binary1234
.
– The password will be lowercase no matter how it appears on the screen.
▼ HINT: https://technet.microsoft.com/en-us/library/ee176852.aspx
Solution
PS C:\users\trebek2\desktop> ls
Directory: C:\users\trebek2\desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 8/30/2018 10:45 AM 0 823
PS C:\users\trebek2\desktop> Get-WmiObject win32_service | Where-Object -Property Name -like 'C-3PO'
| select PathName
PathName
--------
g:\star_wars\droid.exe
Credentials: trebek3:droid823
.
Trebek 3 -> 4
Task
The password for trebek4 is the IP that the user Yoda last logged in from as depicted in the event logs on the desktop PLUS the name of the text file on the user’s desktop.
NOTE: – If the IP address is “2.3.3.2” and the file on the desktop is named “bobby”, the password would be “2.3.3.2bobby”.
▼ HINT: https://technet.microsoft.com/en-us/library/ee176852.aspx
Solution
PS C:\users\trebek3\desktop> ls
Directory: C:\users\trebek3\desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 8/30/2018 10:46 AM 0 address
-a---- 8/30/2018 5:55 AM 99684352 security.evtx
PS C:\users\trebek3\desktop> Get-WinEvent -Path "security.evtx" | Where-Object -Property Message -Mat
ch 'credential' | Where-Object -Property Message -Match 'yoda' | Format-List
TimeCreated : 5/11/2017 8:41:10 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id : 4648
Message : A logon was attempted using explicit credentials.
Subject:
Security ID: S-1-5-18
Account Name: TREBEK$
Account Domain: UNDERTHEWIRE
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name: yoda
Account Domain: UNDERTHEWIRE
Logon GUID: {9449A69A-659C-D6F2-ED4B-53521312F225}
Target Server:
Target Server Name: localhost
Additional Information: localhost
Process Information:
Process ID: 0xf10
Process Name: C:\Windows\System32\winlogon.exe
Network Information:
Network Address: 10.30.1.18
Port: 0
This event is generated when a process attempts to log on an account by explicitly
specifying that account’s credentials. This most commonly occurs in batch-type
configurations such as scheduled tasks, or when using the RUNAS command.
TimeCreated : 5/11/2017 8:41:08 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id : 4776
Message : The computer attempted to validate the credentials for an account.
Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account: yoda
Source Workstation: ORACLE
Error Code: 0x0
TimeCreated : 5/11/2017 8:41:06 PM
ProviderName : Microsoft-Windows-Security-Auditing
Id : 4776
Message : The computer attempted to validate the credentials for an account.
Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account: yoda
Source Workstation: ORACLE
Error Code: 0x0
trebek4:10.30.1.18address
Trebek 4 -> 5
Task
The password for trebek5
is the last execution date of Microsoft Access PLUS the name of the text file on the user’s desktop
.
Note:
– Format for the date is 2 digit month, 2 digit day, 4 digit year. Ex: 9 feb 2009
would be 02/09/2009
.
– If the date is 02/09/2009
and the file on the desktop
is named _bob
, the password would be 02/09/2009_bob
.
▼ HINT:
https://technet.microsoft.com/en-us/library/ee176852.aspx
▼ HINT:
https://www.fireeye.com/blog/threat-research/2013/08/execute.html
Solution
Try with:
Get-WinEvent -LogName "Microsoft-Windows-Shell-Core/Operational" | Where-Object { $_.Message -like "*msaccess.exe*" } | Select-Object -First 1 TimeCreated
Now working:
Get-WinEvent : Attempted to perform an unauthorized operation.
At line:1 char:1
+ Get-WinEvent -LogName "Microsoft-Windows-Shell-Core/Operational" | Wh ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotSpecified: (:) [Get-WinEvent], UnauthorizedA
ccessException
+ FullyQualifiedErrorId : System.UnauthorizedAccessException,Microsoft.Po
werShell.Commands.GetWinEventCommand
Try with:
$path = "$env:SystemRoot\Prefetch\MSACCESS.EXE*"
Get-Item $path | Select-Object LastWriteTime
Output:
LastWriteTime
-------------
1/5/2017 6:04:00 PM
The file on the desktop
:
PS C:\users\trebek4\desktop> Get-ChildItem
Directory: C:\users\trebek4\desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 8/30/2018 10:46 AM 0 _red
Password: 01/05/2017_red
.
Trebek 5 -> 6
Task
The password for trebek6
is the name of the executable that is starting at 3/23/2017 8:08:53 PM
via the Software Protection service as depicted in the event log on the desktop
.
NOTE:
– Don’t include the file extension (i.e. - .exe
).
– The password will be lowercase no matter how it appears on the screen.