THM

A collection of my write-ups for TryHackMe, HackTheBox, and other CTF challenges


Project maintained by UphillPush Hosted on GitHub Pages — Theme by mattgraham

Snapped-Phish-ing-Line

header

An Ordinary Midsummer Day…

As an IT department personnel of SwiftSpend Financial, one of your responsibilities is to support your fellow employees with their technical concerns. While everything seemed ordinary and mundane, this gradually changed when several employees from various departments started reporting an unusual email they had received. Unfortunately, some had already submitted their credentials and could no longer log in.

You now proceeded to investigate what is going on by:

  1. Analysing the email samples provided by your colleagues.
  2. Analysing the phishing URL(s) by browsing it using Firefox.
  3. Retrieving the phishing kit used by the adversary.
  4. Using CTI-related tooling to gather more information about the adversary.
  5. Analysing the phishing kit to gather more information about the adversary.

Note: The phishing emails to be analysed are under the phish-emails directory on the Desktop. Usage of a web browser, text editor and some knowledge of the grep command will help.

Answer the questions below

Who is the individual who received an email attachment containing a PDF?

First, open the phish-emails dir on the desktop and right-click open terminal here, then we need to search for the file that contains the pdf attachment. This can be achieved through the command

grep -l 'name=".*\pdf"' *.eml

This will return the name of the eml file that has a pdf attachment. We want to find out who received that pdf. The command is tunneled with xargs to view how this email was sent to in the command below

grep -l 'name=".*\pdf"' *.eml | xargs -d '\n' "To:"

code of answer1

William McClean





What email address was used by the adversary to send the phishing emails?

The sender name of all files can be displayed with grep command too, as follows

grep -h -A 1 "^From:" *.eml"

Where -h is used to hide the file name
    -A for displaying the line after the search keyword and the lines after, depending on the number follows
     1 number of lines to display after the line match

Picture3

Accounts.Payable@groupmarketingonline.icu





What is the redirection URL to the phishing page for the individual Zoe Duncan? (defanged format)

For this question, we have to open the email sent to Zoe and download the attached html to inspect it

Screenshot 2026-01-18 175342 Screenshot 2026-01-18 175412



Now, the html file must be inspected for any url inside it, which can be done through the commnad

grep "http[^ ]" *.html

Screenshot 2026-01-18 175932

So the URL is:

http://kennaroads.buzz/data/Update365/office365/40e7baa2f826a57fcf04e5202526f8bd/?email=zoe.duncan@swiftspend.finance&error

This URL has to be defanged as required in the question, so Cyberchef was used to do it:

Picture4

hxxp[://]kennaroads[.]buzz/data/Update365/office365/40e7baa2f826a57fcf04e5202526f8bd/?email=zoe[.]duncan@swiftspend[.]finance&error



What is the URL to the .zip archive of the phishing kit? (defanged format)

so for the link:
http://kennaroads.buzz/data/Update365/office365/40e7baa2f826a57fcf04e5202526f8bd/?email=zoe.duncan@swiftspend.finance&error
we will just keep the main path:
http://kennaroads.buzz/data/Update365/
Picture5

There is no .zip file here, so going back a bit to the link:
http://kennaroads.buzz/data

show us this page

Picture6

Now, we can clearly see the .zip archive of the phishing kit, which is Update365.zip so the link we are looking for is:
http://kennaroads.buzz/data/Update365.zip

defang this URL using CyberChef:
Picture7

hxxp[://]kennaroads[.]buzz/data/Update365[.]zip



What is the SHA256 hash of the phishing kit archive?

Download the Update365.zip in the phish-emails dir, then in the terminal write the command:

sha256sum Update365.zip

Picture8

ba3c15267393419eb08c7b2652b8b6b39b406ef300ae8a18fee4d16b19ac9686





When was the phishing kit archive first submitted? (format: YYYY-MM-DD HH:MM:SS UTC)

In my browser, I visited virustotal page and inserted the archive sha256 hash to scan it, and easily saw the submission date
image



2020-04-08 21:55:50 UTC





What was the email address of the user who submitted their password twice?

The best way to track the login attempts is through logs, and in previous questions its know where are the hosting files

so back again to the link:
http://kennaroads.buzz/data

a log.txt file is seen, open it and try to look up for repeated email or password

image

michael.ascot@swiftspend.finance



What was the email address used by the adversary to collect compromised credentials?

To know this we have to investigate more in the phishing kit archive, heading back to the host website at:

http://kennaroads.buzz/data/Update365.zip

the Update365.zip is downloaded, then we move it to the phish-emails dir to investigate it using the command

  mv ~/Downloads/Update365.zip .

Then Unzip it using the command

unzip Update365.zip

image

The file that collects emails and send it have the word send in it for sure and is in the Update365 folder, so searching for files that contain the send keyword using the command

grep -r "*send"

we found

image

The submit.php is the file responsible for the submit button, to further investigate it we tunneled the command with cat image image

Here, another suspicious email is found, and the responses are sent to whom is

m3npat@yandex.com



The adversary used other email addresses in the obtained phishing kit. What is the email address that ends in “@gmail.com”?

This one is easy, you just have to search for an email that ends with @gmail.com using the command:

grep -r "@gmail.com"

image

jamestanner2299@gmail.com



What is the hidden flag?

Reading the instruction for this one :
image

Then the flag is a text file that is a subdomain or a directory of the phishing URL, since there is no enumeration tool in the VM like Gobuster, I guessed its called flag.txt
so I tried this directory in the URL :
image
So the flag is found, but it seems to be encoded. For that, we will use CyberChef to decode it back

image

THM{pL4y_w1Th_tH3_URL}