Optimum

This box is based on web service exploitation.

Overview

Initial Foothold : Rejetto HTTP File Server Exploitation

Privilege Escation : Kernel Exploit

Enumeration

Starting with port scanning

Port Scanning

From Port scanning we only got port 80 open. Lets start with web enumeration

Web Enumeration

By visiting we can confirm that port 80 is running HttpFileServer 2.3

This looks odd lets search for this on google

We got some exploits for this web application

We will try to use CVE-2014-6287

Summary

We got exploit for vulnerable HTTP File Server 2.3

Exploitation

We have exploit for HTTP File Server 2.3

There are prerequisite for this exploits lets see that

This exploit require to host nc.exe on port 80

lets do that

Now change the ip_addr and local port in the script

Start listener on port 443

Now launch the exploit

This exploit require to be run 2-3 times and we got our shell back

We got user kostas shell

Get the user.txt.txt file

Privilege Escalation

This box was vulnerable to kernal exploit

Kernel Exploit

Lets use windows-exploit-suggester.py script for finding any kernel exploit

you can download it from below link

Update the database for this script of kernel exploits

Now gather systeminfo information from our target host

Copy the above information to our local host machine

and execute the windows-exploit-suggester script

We got many kernel vulnerablities

circle-info

If the kernel exploit is not working try to reset the machine and try again

Now we will use prebuild binaries for exploitation

You can get this from

After trying many kernel exploits we got system shell from ms16-032 exploit

How ??

Download the ms16-032 binary from above github repo

Now transfer this bfill.exe binary to windows host

and execute this binary

Got the system shell

Now get the root text file

Thats all for this box

Good Bye :)

Last updated