description |
---|
09-14-22 |
- I learned a VERY valuable skill here; if you enumerated THE ABSOLUTE HELL out of a box, check for public exploits.
- Nmap -- NmapAutomator.sh
Scanned all TCP ports:
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
5040/tcp open unknown
9998/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
17001/tcp open remoting MS .NET Remoting services
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Enumerated UDP ports:
Notes:
- I could not find anything for the longest time
- I attempted to enumerate the anonymous FTP but there was nothing lucrative
This is the exploit that I used to completely root the machine in one shot.
{% embed url="https://www.exploit-db.com/exploits/49216" %} ExploitDB PoC {% endembed %}
- Modify the script (change LHOST, LPORT, RPORT, and HOST)
- Start Netcat listener
- Execute exploit
- Shell!!
PWND