Silo
Gaining Access
Nmap scan:
$ nmap -p- --min-rate 5000 10.129.95.188
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-02 08:12 EDT
Warning: 10.129.95.188 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.129.95.188
Host is up (0.013s latency).
Not shown: 65350 closed tcp ports (conn-refused), 170 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1521/tcp open oracle
5985/tcp open wsman
47001/tcp open winrm
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49159/tcp open unknown
49160/tcp open unknown
49161/tcp open unknown
49162/tcp open unknownLots of ports, including some I'm not familiar with like port 1521.
Oracle RCE
I initially ran a few directory scans and SMB enumeration, but they all returned nothing interesting. So I decided to scan port 1521 in detail because I normally don't see that one.
So this was an Oracle port. Based on Hacktricks, we can try using odat.py to attack this.
We can run the enumeration to find all SIDs and possible passwords before attacking it.
We found the database and also some credentials, which I think is enough to exploit this system easily. With these, we can upload a reverse shell onto the server rather easily.
First, we can create a reverse shell via msfvenom:
Then we can run the following commands:
We would gain a reverse shell as the administrator.
