Last updated
Last updated
There are two webservers running, one on port 80 and the other oner on port 8080.
The other server is being run on port 8080 with HFS 2.3. it has a number of exploits
lets first exploit it with metasploit
And we get a meterpreter shell. Move to the desktop folder and get the user flag
Scan the machine with nmap. What is the other port running a web server on?
8080
Take a look at the other web server. What file server is running?
rejetto http file server
What is the CVE number to exploit this file server?
2014-6287
Use Metasploit to get an initial shell. What is the user flag?
b04763b6fcf51fcd7c13abc7db4fd365
lets first check msf exploit suggester
it only found exploit/windows/local/bypassuac_eventvwr which did not work
upload the script with metasploit
Now run the script with Powershell
The Iobit AdvancedSystemCareService9 service is vulnerable to path hijack. No quotes are being used to enclose the path.
Now create a reverse shell payload
using reverse meterpreter payload dies if used and we have to chain it with post/windows/manage/migrate
Now upload the malicious file and changer meterpreter to shell, stop the service and then copy the file the same location, start listener at port 4443 and start the service again.
and we got the reverse shell
Take close attention to the CanRestart option that is set to true. What is the name of the service which shows up as an unquoted service path vulnerability?
AdvancedSystemCareService9
What is the root flag?
9af5f314f57607c00fd09803a587db80
Change the ip address within the file to your local ip
Now download the netcat binay and host it on the webserver.
now get the winpeas on your system
use the 64 bit version
So, we can copy the malicious payload as above and do the privilege escalation.
Windows box, HFS