Technical Report

Detailed analysis for technical teams, covering methodologies, tools, and findings.

Technical Security Report: "TakeOver" System

Purpose of the Report

The purpose of this report is to document the methodology and findings obtained during the security assessment of the Takeover machine. The main objective was to identify weaknesses related to subdomain management and SSL certificate exposure.


Methodology

  1. Modify local DNS resolution to access the target domain.

  2. Perform network and service enumeration.

  3. Identify potential subdomains through logical deduction and SSL certificate analysis.

  4. Access internal resources exposed via misconfigured subdomains.


Detailed Findings

1. Reconnaissance

After adding futurevera.thm to the /etc/hosts file, a network scan using Nmap (-sCV -Pn -T5 -F) revealed three open ports:

  • 22/tcp (SSH) – OpenSSH 8.x

  • 80/tcp (HTTP) – Redirecting to HTTPS

  • 443/tcp (HTTPS) – Web server secured with SSL

Initial browsing of https://futurevera.thm hinted at an ongoing rebuild of the support service, suggesting the possible existence of a support subdomain.

  1. Privilege Escalation

No privilege escalation techniques were required.

However, through further manual testing:

  • We manually added support.futurevera.thm to the /etc/hosts file.

  • Upon accessing https://support.futurevera.thm, no sensitive data was immediately visible.

  • Inspection of the SSL certificate revealed an additional subdomain: https://secret******-support.futurevera.thm.

After adding https://secret******-support.futurevera.thm to /etc/hosts and accessing it, we discovered a page displaying sensitive information, namely the flag, thus completing the machine’s challenge.


Conclusion

The Takeover machine demonstrated how improper management of SSL certificates and subdomains can expose sensitive resources. The internal support site was inadvertently revealed through SSL certificate enumeration, representing a real-world example of data leakage due to incomplete access control and subdomain oversight.

Last updated