System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity…

Follow publication

Member-only story

Brooklyn99 WriteUp | Steganography & Binary Exploitation

Greetings everyone, today I would like to analyze BrooklynNineNine on TryHackMe platform. Actually, it was not so hard to deal with that machine because of my real-world test experiences. I recognized that I am now able to deal with more complicated reconnaissance on web applications. Therefore, I was comfortable to jump post-compromise part on this instance.

Let me add my IPv4 address to /etc/hosts to avoid specifying the address in commands each time.

Open hosts file

nano /etc/hosts

[MACHINE-IP] brooklyn.thm

Save with C^S and exit C^X

This how it looks like.

Reconnaissance

First of all, I did not want to use browser to display HTML elements of the page. That's why, I decided to use curl to save time. Maybe we have a web app on port 80 or 443

curl -v brooklyn.thm

As you can see below, there was a comment indicating the technique called Steganography

<!--- Have you ever heard of steganography? -->

Let me extract the image from web application through my browser:

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Written by Onurcan Genç

Offensive Security Specialist | Tech Enthusiast Welcome to my playground !

No responses yet

Write a response