Kevin
Gaining Access
Nmap scan:
$ nmap -p- --min-rate 3000 -Pn 192.168.160.45
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-13 14:02 +08
Nmap scan report for 192.168.160.45
Host is up (0.17s latency).
Not shown: 65523 closed tcp ports (conn-refused)
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
3573/tcp open tag-ups-1
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49158/tcp open unknown
49159/tcp open unknownHP Power Manager -> RCE
Port 80 is running HP Power Manager and it looks vulnerable:

admin:admin works in logging in:

There are a couple of exploits available for this software:
All of them are forms of Buffer Overflow, and I used 10099.py to exploit it. FIrst, generate the shellcode needed with the bad characters and encoding given in the exploit:
Then, replace the shellcode within the Python script and start a listener port.
After running it, we would get a shell as the SYSTEM user:

Last updated