Metasploitable 3

The Seven of Hearts

For this one I used SSH with the Administrator account with the password that I guessed for another flag/card.

I remembered there was a flag in the C:\inetpub\wwwroot folder and went to take a look at the folder:  

root@igor-kali:~/metasploitable3# ssh Administrator@10.20.10.23

Administrator@10.20.10.23’s password:


Last login: Sat Dec 17 12:41:58 2016 from 10.20.10.18

\-sh-4.3$ pwd

/cygdrive/c/Users/Administrator

\-sh-4.3$ cd ../../inetpub

\-sh-4.3$ pwd

/cygdrive/c/inetpub

\-sh-4.3$ cd wwwroot

\-sh-4.3$ ls

aspnet_client  caidao.asp  hahaha.jpg  index.html  **seven_of_hearts.html**  six_of_diamonds.zip  welcome.png

I used Burp Suite to intercept the response with the whole URL generated by the JavaScript embedded in the HTML file

[![](/assets/images/seven_of_hearts-url.jpg)](/assets/images/seven_of_hearts-url.jpg)

Burp Suite showing base64 URL

I saved the output to text file in my system and ran a quick perl script with a regex to extract only the base64 data


```bash
root@igor-kali:~/metasploitable3# cat seven_of_hearts2.url | perl -ne 'print $1 if(/GET \/(.\*)HTTP/g)' > seven_of_hearts.b64

*and then decoded the base64 string to binary*

root@igor-kali:~/metasploitable3# cat seven_of_hearts.b64 | base64 -d > seven_of_hearts.png

base64: invalid input

Even though it gave me an invalid input message it still did it

root@igor-kali:~/metasploitable3# file seven_of_hearts.png

seven_of_hearts.png: PNG image data, 521 x 729, 8-bit/color RGBA, non-interlaced

Johnny Bravo?


← Back to all posts