Anthem Tryhackme Walkthrough

3 Min Read

Anthem Tryhackme Walkthrough: Exploit a Windows machine in this beginner level challenge. This task involves you, paying attention to details and finding the ‘keys to the castle’. This room is designed for beginners, however, everyone is welcomed to try it out! Enjoy the Anthem.

In this room, you don’t need to brute force any login page. Just your preferred browser and Remote Desktop.

Please give the box up to 5 minutes to boot and configure.

Reconnaissance

Starting with an nmap scan .

nmap -sS -sV -A <IP>

nmap

We discover 2 open ports 80 and 3389. There is port 80 open so it means there should a website.

web server port
rdp port

Let’s see what the website has for us.

first article

We can find our first couple of flags just by looking through the pages and checking the page source. Along with that sets run dirbuster to find the web directories.

Checking robots.txt

robots file
hidden dir

Here can have some juicy stuff and another flag.

password

So we know UmbracoIsTheBest! is a possible password for some login

domain

On one of the pages, we see this poem.

it article

On further googling, we find that the author of this poem is Solomon Grundy

poem
admin name

On one of the pages, we saw the email id of Author Jane Doe as JD@anthem.com

jd email

So it made sense that the email id for Solomon grundy would be also SG@anthem.com

admin email

Checking the source code

http://<IP>/archive/we-are hiring/ > view source code

flag1
flag1 me

http://<IP>/archive/a-cheers-to-our-itdepartments/ > view source code

flag2
flag2 good

http://<IP>/authors/jane-doe/

flag 3 this
flag3

http://<IP>/archive/a-cheers-to-our-it-departmenst/ > view source code

flag4
flag 4 meta

Finding the main flags

As we already know that we have a remote desktop port 3389 open, we use the already found credentials to log in.

Username — SG

Password — UmbracoIsTheBest!

rdesktop -u SG -p UmbracoIsTheBest! <IP>

rdp connect
rdp win

Here we have our user flag.

user.txt
user flag

Now our root flag is hidden. There is a backup folder that has the password required to access the Administrator folder. Enable hidden items folder to view it.

nope
hidden file

Inside the backup folder, we have a restore.txt file that we do not have permission to open. For that, we need to change permissions for this file.

no permission

select restore.txt > Right click > properties > security > edit >type SG and click check nanes> ok>apply.

add sg user

Now we can easily open the file and see the admin password

admin pass
admin password

Using this we access the Administrator folder and get the root flag.

got root.txt
root flag

And we finished the room, leaves some claps if you found this helpful.

Read Also | Brooklyn Nine Nine Tryhackme Walkthrough

Share This Article