Nmap scan:
Port 9256 was a rather unusual port to be open.
Researching a bit about this port led me to this post:
So this port had a vulnerable software on it that is vulnerable to a Remote BOF exploit. We can use an exploit from exploit-db for this:
Again, we would need to replace the shellcode with a reverse shell one. We can do so like this:
Then, we can run the script and a shell would pop on our listener port.
When I ran WinPEASx64 on this machine, there was a lot of indication that we had AllAccess to the administrator's desktop.
However, we cannot read the root flag for some reason.
We can check the permissions using icacls
.
So we the user have Full Control over the Desktop (that's what (F) means), but the flag has been configured like so. To cirumvent this, we can grant ourselves the permission to read the files.
Then, we can read the root flag.