Optimum
This box is based on web service exploitation.
Last updated
Was this helpful?
This box is based on web service exploitation.
Last updated
Was this helpful?
Initial Foothold : Rejetto HTTP File Server Exploitation
Privilege Escation : Kernel Exploit
Starting with port scanning
From Port scanning we only got port 80 open. Lets start with web enumeration
By visiting we can confirm that port 80 is running HttpFileServer 2.3
This looks odd lets search for this on google
We got some exploits for this web application
We will try to use CVE-2014-6287
We got exploit for vulnerable HTTP File Server 2.3
We have exploit for HTTP File Server 2.3
There are prerequisite for this exploits lets see that
This exploit require to host nc.exe on port 80
lets do that
Now change the ip_addr and local port in the script
Start listener on port 443
Now launch the exploit
This exploit require to be run 2-3 times and we got our shell back
We got user kostas shell
Get the user.txt.txt file
This box was vulnerable to kernal exploit
Lets use windows-exploit-suggester.py script for finding any kernel exploit
you can download it from below link
Update the database for this script of kernel exploits
Now gather systeminfo information from our target host
Copy the above information to our local host machine
and execute the windows-exploit-suggester script
We got many kernel vulnerablities
Now we will use prebuild binaries for exploitation
You can get this from
After trying many kernel exploits we got system shell from ms16-032 exploit
How ??
Download the ms16-032 binary from above github repo
Now transfer this bfill.exe binary to windows host
and execute this binary
Got the system shell
Now get the root text file
Thats all for this box
Good Bye :)