Enumeration

Nmap

Initial Nmap scan revealed uncommon ports and an FTP port were open.

00 - nmap

FTP Enumearation

FTP has anonymous session available but user had no read or write permissions.

01 - ftp anon

However, I found uac files which revealed ftp usernames.

01 - ftp anon available users

Then brute forced with ftp wordlist and found out admin:admin is also a valid credential.

02 - admin admin is also allowed

Exploitation

.htpasswd cracking

Logged in as admin and found that 3 files were readable (‘index.php’, ‘.htpasswd’, ‘.htaccess’). Then I did some research and found out .htaccess file is used to restrict website by setting basic auth and .httpasswd file is used to store username and hashed password.

03 - limiting and has

Then I simply cracked the hash using hashcat.

04 - cracked

05 - cracked real

WEB Login

Then logged in to the website running on port 242 which only showed index.php file.

06 - logged in to web

I then tested ftp to put files and it worked. I simply uploaded reverse php shell via ftp put and got a reverse shell.

07 - revshell

08 - got it

User Flag

Then obtained user flag.

09 - local flag

Privilege Escalation

SeImpersonatePrivilege

The SeImpersonatePrivilege was enabled for apache user.

10 - privilege

I tried to exploit it with many methods and it did not work. I later found out that on older Windows versions (such as Windows 7 or Server 2008 R2), the combase.dll library does not exist and vulnerability occurs because of that dll. So below are vulnerable:

  • Windows Server 2012 - Windows Server 2022
  • Windows8 - Windows 11

But, current machine is not vulnerable because it is Windows Server 2008.

MS11-046

Then I checked system version. Found out that the version has kernel-level privilege escalation vulnerability.

11 - version

12 - exploit

While searching to find exploit I found windows-kernel-exploits repo which included many executable exploit files for kernel exploits.

13 - github

So I simply uplaoded it and ran it and got the SYSTEM shell.

14 - priv esc

Then read the root flag.

16 - got it


<
Previous Post
Algernon - Proving Grounds Practice
>
Next Post
Astronaut - Proving Grounds Practice