We can use gobuster on the website to find more directories:
Checking the contact.php file, we see the software used to make this.
Then, we can search for exploits for this Gym Management Software 1.0.
We can try the RCE exploit:
By running the exploit, we would gain a webshell:
Afterwards, we can download nc.exe onto the machine via smbserver.py.
Privilege Escalation
CloudMe
When enumerating the user's directory, we find a CloudMe_1112.exe file:
C:\Users\shaun\Downloads>dir
dir
Volume in drive C has no label.
Volume Serial Number is A22D-49F7
Directory of C:\Users\shaun\Downloads
14/07/2020 13:27 <DIR> .
14/07/2020 13:27 <DIR> ..
16/06/2020 16:26 17,830,824 CloudMe_1112.exe
1 File(s) 17,830,824 bytes
2 Dir(s) 7,564,353,536 bytes free
When checking for exploits regarding CloudMe, we can find a few Buffer Overflow exploits that can be used for RCE using shellcode.
CloudMe for this machine runs on port 8888 on this machine, so we can just run it and use chisel to port forward port 8888.
# on Kalichiselserver--port4444--reverse# on host.\chisel.execlient10.10.14.2:4444R:8888:localhost:8888
Then, we need to generate new shellcode for the exploit: