TryHackMe: Advent of Cyber 2 [Day 3] Christmas Chaos

Samantha
3 min readJan 2, 2021

Room: Advent of Cyber 2

Difficulty: Beginner

McSkidy is walking down the corridor and hears a faint bleeping noise, Beep…. Beep…. Beep… as McSkidy gets closer to Sleigh Engineering Room the faint noise gets louder and louder.. BEEP…. BEEP…. Something is clearly wrong! McSkidy runs to the room, slamming open the door to see Santa’s sleighs control panel lite up in red error messages! “Santa sleigh! It’s been hacked, code red.. code red!” he screams as he runs back to the elf security command center.

Can you help McSkidy and his team hack into Santa’s Sleigh to re-gain control?

Here is the website related to the challenge:

It appears that the goal is to brute force the login form with Burp Suite. So I started up Burp Suite and then turned on Foxy Proxy so I could start intercepting traffic:

I’m going to use the default credentials list to try and gain access, attempting them one by one:

I started with a test:

And then checked back with Burp Suite so I could look over the request:

After this, you can right-click anywhere in that section and choose “send to intruder”:

From the Intruder, check out the positions tab:

You can see that it already defaults some positions for you (highlighted in green). Those are the areas that Burp Suite will brute force.

Change the attack type to “Cluster Bomb”, so that each payload specified will rotate in and out in turn.

For payload 1 (the first green highlight), add all the usernames:

For payload 2, add all the passwords:

Now, click the “Start Attack” button in the top right to start to automated attack.

Usually, the one with the different length is the correct combo. So let’s try to login with user=admin and pass=12345

Also, remember to turn off Foxy Proxy before you try to login.

We’re in!

I realize you could have just used all of those combos in turn, which would have taken you 9 attempts. It would have probably been faster.

But I think the point was to learn how to automate it for larger attacks. For example, you could have loaded a much longer list in there if you crawled a website for keywords or something like that.

Happy Hacking! ❤

--

--

Samantha

CTF writeups to facilitate cyber education and help me earn CPEs