Nickel
Gaining Access
Nmap scan:
$ nmap -p- --min-rate 4000 192.168.240.99
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-07 14:39 +08
Nmap scan report for 192.168.240.99
Host is up (0.17s latency).
Not shown: 65518 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
5040/tcp open unknown
7680/tcp open pando-pub
8089/tcp open unknown
33333/tcp open dgi-serv
49664/tcp open unknown
49665/tcp open unknown
49666/tcp open unknown
49667/tcp open unknown
49668/tcp open unknown
49669/tcp open unknownFTP doesn't accept anonymous logins and RDP is open for this machine.
Web Enumeration -> User Creds
Port 80 was weird:

Port 8089 was slightly weirder:

Clicking on any of these would send requests to an IP address on port 33333:

Meanwhile on port 33333, we needed a token of some sorts:

And this is all the information we have. I experimented with sending POST requests instead of GET requests, and it actually returned something from port 33333.

This was different from the Not Found errors. I changed around the directory it sent requests to, and the list-running-procs returned something interesting:

If we scroll down, we can see this:
This was a password for a user ariah, which works:

Privilege Escalation
FTP PDF -> Admin Shell
There was a C:\ftp directory that looked interesting:
We can transfer this back to our machine via smbserver.py and then view it.

There was a temporary command point, and I enumerated it from the machine:
It seems that we have a SYSTEM shell with this command endpoint. What we can do is just add ariah to the Administrators group.
Then, we can relogin and view the flag:

Rooted!
Last updated