OverTheWire Monxla Part 1

I had a twitter follower recently inform me that OverTheWire had a new wargame up and running.  I was immediately excited and downloaded it.  Several days later, I actually was able to start tinkering with it.

I booted up the image, and proceeded to do some preliminary nmap scans.  I found a few services runinng:

mandreko$ nmap -sV -p1-65535 -T4
Starting Nmap 6.01 ( http://nmap.org ) at 2012-11-15 10:28 EST
Nmap scan report for
Host is up (0.0077s latency).
Not shown: 65511 closed ports
22/tcp    open  ssh     OpenSSH 5.8p1 Debian 7ubuntu1 (protocol 2.0)
80/tcp    open  http    Apache httpd 2.2.20 ((Ubuntu))
6667/tcp  open  irc     Unreal ircd
8000/tcp  open  http    Icecast streaming media server
21342/tcp open  unknown
21768/tcp open  unknown
21951/tcp open  unknown
23917/tcp open  unknown
24578/tcp open  unknown
24783/tcp open  unknown
25275/tcp open  unknown
26791/tcp open  unknown
31308/tcp open  unknown
31418/tcp open  unknown
31874/tcp open  unknown
32704/tcp open  unknown
33039/tcp open  unknown
34466/tcp open  unknown
34538/tcp open  unknown
34957/tcp open  unknown
36199/tcp open  unknown
37213/tcp open  unknown
37628/tcp open  unknown
37956/tcp open  unknown

Based on the clue on the Monxla page, “Hint: how big is the page you are looking at?”, I connected to the webserver.

It looked like a fairly generic page, but I viewed the source, and found a huge amount of text commented out.  Since it was all alpha-numeric other than ending with a single “=”, I figured it was probably Base64.

I copied the text into a new file on my machine. I then decoded it and found out what type of file it was:

mandreko$ base64 -D monxla -o monxla.decoded
mandreko$ file monxla.decoded
monxla.decoded: PDF document, version 1.4
mandreko$ mv monxla.decoded monxla.pdf

When the PDF (available here) is then opened, it shows a report of running services that may need attacked. This is similar to “levels” in most wargames, I believe (I haven’t yet finished this wargame).

My next article in this series will show how to exploit the “Bookmarks Service”.

comments powered by Disqus