Arctic¶
Recon¶
The tags for this box are:
- Windows
- Arbitrary File Upload
- Patch Management
- Web
Difficulty:
Easy
Port scan¶
There is a mystery service running on port 8500. The other open ports are RPC. Better figure out what the mystery service is.
PORT STATE SERVICE REASON VERSION 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 8500/tcp open fmtp? syn-ack ttl 127 49154/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|phone|specialized Running (JUST GUESSING): Microsoft Windows 8|Phone|2008|7|8.1|Vista|2012 (92%)
Port 8500 - Cold Fusion 8¶
Software version disclosure
Searching for exploits
50057 looks promising. Interestingly enough, rhost and rport were already correct -it's almost like this exploit was developed/tested on this HTB box.
That gave us shell as arctic\tolis
User flag
Privilege Escalation¶
WinPEAS interesting findings¶
Exploit Suggester¶
I've had luck with MS10-059
in the past and figured that was a good way to go. I got the .exe from SecWiki
It worked, the listener (left) caught a system shell that was spawned by MS10-059 (right side).
Root flag: