Buff

Gaining Access

Nmap Scan:

Gym

On port 8080, it was a gym-related page:

We can use gobuster on the website to find more directories:

Checking the contact.php file, we see the software used to make this.

Then, we can search for exploits for this Gym Management Software 1.0.

We can try the RCE exploit:

By running the exploit, we would gain a webshell:

Afterwards, we can download nc.exe onto the machine via smbserver.py.

Privilege Escalation

CloudMe

When enumerating the user's directory, we find a CloudMe_1112.exe file:

When checking for exploits regarding CloudMe, we can find a few Buffer Overflow exploits that can be used for RCE using shellcode.

CloudMe for this machine runs on port 8888 on this machine, so we can just run it and use chisel to port forward port 8888.

Then, we need to generate new shellcode for the exploit:

The final script based on the PoC should look like this:

Afterwards, run it using python3 and an administrator shell will spawn.

Rooted!