Ask Blue Cat

MEOW

View project on GitHub
๐Ÿ  Home ๐Ÿ“ All Blogs ๐Ÿฑ About BlueCat
TryHackMe cybersecurity challenge

BlueCat tackles TryHackMe's Silver Platter challenge, meow! ๐Ÿฑโšก

Silver Platter Room - TryHackMe Walkthrough Meow! ๐Ÿฑ

Originally published on LinkedIn, adapted for BlueCatโ€™s cybersecurity blog with extra meow wisdom!

Meow meow! Today BlueCat is sharing a detailed penetration test report of the TryHackMe โ€œSilver Platterโ€ room. This was a purrfect example of how multiple vulnerabilities can be chained together for full system compromise, meow!

๐Ÿ“‹ Penetration Test Report - Meow Edition!

Target: TryHackMe - Silver Platter
Assessment Type: CTF-style engagement
Date: July 9, 2025
Author:Meow

๐ŸŽฏ 1. Executive Summary

This assessment targeted the โ€œSilver Platterโ€ machine on TryHackMe, meow! The objective was to compromise the system and capture both user and root flags - like catching two mice with one pounce!

The system was vulnerable to multiple high-impact flaws:

  • Silverpeas authentication bypass (CVE-2024-36042) ๐Ÿšซ
  • IDOR vulnerability leaking internal messages (CVE-2023-47323) ๐Ÿ“
  • Poor operational security in log management and sudo configurations ๐Ÿ”“

Outcome: Full compromise achieved - BlueCat caught all the digital mice! ๐Ÿญ
Risk Level: Critical โš ๏ธ

๐ŸŽฏ 2. Scope

  • Target IP: 10.10.**
  • Flag Goals: /home/*/user.txt, /root/root.txt

๐Ÿ” 3. Methodology - BlueCatโ€™s Hunting Strategy

The assessment followed a structured black-box testing approach - like a cat stalking its prey methodically, meow!

Key tools and techniques:

  • Rustscan and Nmap for initial recon (sniffing around)
  • Wfuzz for directory and parameter fuzzing (looking under every digital rock)
  • Burp Suite for intercepting web requests (catching packets like flies!)
  • SSH for shell access (entering the mouse hole)
  • Manual log review for privilege escalation (finding hidden treasures)

๐Ÿ•ต๏ธ 4. Detailed Findings - The Hunt Begins!

4.1 Initial Recon - Sniffing Out Services

rustscan -a 10.10.***.*** --ulimit 5000 -b 2500 -- -sC -sV -oA rustscan-full

Discovered Ports:

  • 22/tcp โ€“ OpenSSH 8.9p1 ๐Ÿ”‘
  • 80/tcp โ€“ nginx web server ๐ŸŒ
  • 8080/tcp โ€“ Mystery service ๐Ÿค”

4.2 Web Enumeration (Port 80) - Exploring the Territory

wfuzz -u http://10.10.***.***/FUZZ -w /opt/SecLists/Discovery/Web-Content/raft-small-directories.txt --hc 404 -t 50

Endpoints Discovered:

  • /contact (revealed username scr1ptkiddy - meow, what a name!)
  • /about, /home

4.3 Silverpeas Enumeration (Port 8080) - The Plot Thickens

wfuzz -u http://10.10.***.***:8080/silverpeas/FUZZ -w /opt/SecLists/Discovery/Web-Content/raft-medium-words.txt --hc 404 -t 50

Endpoints: /jsp, /RSILVERMAIL

4.4 Authentication Bypass - CVE-2024-36042 ๐Ÿšช

Vector: Login to Silverpeas with scr1ptkiddy, remove password parameter using Burp Suite.

Result: Bypassed login and granted SuperAdmin web access - meow! It was easier than opening a can of tuna!

BlueCatโ€™s Note: This is why input validation is crucial, meow! Never trust what users send you - they might be sneaky cats trying to bypass your authentication!

4.5 IDOR Vulnerability - CVE-2023-47323 ๐Ÿ“จ

URL Accessed:

http://10.10.***.***:8080/silverpeas/RSILVERMAIL/jsp/ReadMessage.jsp?ID=6

Leaked Credentials:

  • Username: tim
  • Password: cm0nt!**************************

BlueCatโ€™s Wisdom: IDOR vulnerabilities are like leaving your diary open - anyone can read messages that arenโ€™t meant for them, meow!

4.6 Foothold via SSH - Entering the Castle! ๐Ÿฐ

ssh tim@10.10.***.***

Flag Captured: /home/tim/user.txt
Value: THM{c4***9b} ๐Ÿ

4.7 Privilege Escalation to Tyler - Climbing Higher! ๐Ÿง—

Inspected: /var/log/auth.log

Found: DB_PASSWORD=_Zd*****/

Escalation Path:

su tyler
# Password: _Zd*****/
sudo -l  # Full sudo access - jackpot!
sudo su
cat /root/root.txt

Root Flag: THM{09****f6} ๐ŸŽ‰

๐Ÿ”— 5. Exploit Path Summary - The Full Hunt

  1. Web Enumeration โ†’ /contact leaks scr1ptkiddy username
  2. Silverpeas Bypass โ†’ CVE-2024-36042 allows admin access
  3. IDOR Abuse โ†’ CVE-2023-47323 leaks timโ€™s SSH credentials
  4. SSH Foothold โ†’ Login as tim, read user flag
  5. Log Abuse โ†’ DB password reused for tyler user
  6. Sudo Exploitation โ†’ sudo su to root, read root flag

๐Ÿ›ก๏ธ 6. BlueCatโ€™s Security Recommendations - Protecting the Digital Territory

To address these vulnerabilities, meow meow:

  1. Upgrade Silverpeas to version 6.3.5+ to patch CVE-2024-36042
  2. Implement proper access controls - donโ€™t let cats read other catsโ€™ messages!
  3. Never log sensitive credentials - itโ€™s like writing your secrets on the wall, meow!
  4. Apply principle of least privilege - not every cat needs root access!
  5. Regular security audits - keep your claws sharp and your defenses sharper!

๐Ÿ 7. Conclusion - Mission Accomplished!

The target system was successfully compromised using multiple real-world vulnerabilities, meow! This challenge perfectly demonstrates how security flaws can be chained together like a cat toy on a string.

Key Lessons:

  • Defense in depth is crucial - one weak link can compromise everything
  • Logging practices matter - donโ€™t accidentally expose secrets
  • Access controls should be properly implemented and audited
  • Regular updates are essential to patch known vulnerabilities

Remember: A secure system is like a well-protected cat fortress - multiple layers of defense and constant vigilance, meow meow! ๐Ÿฐ๐Ÿฑ


Ready to try this challenge yourself, meow? Visit TryHackMe and sharpen your cybersecurity claws! Donโ€™t forget to practice responsible disclosure and ethical hacking principles! ๐Ÿพ

What do you think of this writeup, meow? Share your thoughts and stay secure online!

๐Ÿ  Home ๐Ÿ“ All Blogs ๐Ÿฑ About BlueCat