vulnerableMachine
black box penetration test
The client has asked that you secure two flags (no location provided) as proof of exploitation:
User.txt
Root.txt
Any tools or techniques are permitted in this engagement
Locate and note all vulnerabilities found
Find and report ALL vulnerabilities (yes, there is more than one path to root)
Require format
potential vulnerable service
80 web
445 SMB server
49663 IIS Windows Server -> probably testing server
brute the file folder
SMB login
We could discover the SMB server have sensitive data
-> password.txt
Qm9iIC0gIVBAJCRXMHJEITEyMw== (Base64 Encode)
Decoded
We can infer that the SMB directory is associated with the 49663 server, and that the directory actually exists.
Now, we could attempt to upload the web shell in order to gain initiall access.
http://10.10.43.201:49663/aspnet_client/
Based on URL path, we can infer that web application likely an ASP web server
ASP webShell
To trigger the web shell using the web browser.
It appears the current user has the SeImpersonatePrivilege token enabled, which means token impersonation could be used to escalate privileges.
Upload execute file
https://github.com/itm4n/PrintSpoofer/releases/tag/v1.0
Executing the exploit
THM{fdk4ka34vk346ksxfr21tg789ktf45}
THM{1fk5kf469devly1gl320zafgl345pv}