MidwintersTomb

CTF write ups and other sundries.


Project maintained by MidwintersTomb Hosted on GitHub Pages — Theme by mattgraham

Chatterbox

I clap, you clap, we all clap for nmap.

Looking at the results we have something we haven’t seen before. So let’s search for AChat exploits. (In this case, we’re using https://github.com/mpgn/AChat-Reverse-TCP-Exploit)

Let’s git clone the repo to our /opt directory.

To avoid using metasploit, and use a netcat listener instead, we must edit the AChat_Payload.sh file before running it:

Now, let’s generate the payload.

We’ll now copy the payload into AChat_Exploit.py, followed by editting the server address:

Next we’ll get our netcat listener setup.

Lastly, we’ll launch the exploit.

Let’s check our listener.

Looks good, let’s grab the user flag.

Let’s check if there’s an autologon account on this system with reg query "HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon".

Looks like we have Alfred’s password now, let’s keep that in mind, in case we need it later.

Let’s run netstat -ano to see what all is listening on the server.

We don’t see anything too interesting that’s only on the inside that we didn’t already see on the outside.

Let’s see if Alfred is a lazy admin and reusing the password for the administrator account. We’ll attempt to browse to the SMB share.

Looks like that is indeed the case.

Let’s go grab that root flag and call it a day.

And with that, we’re done another box.


Findings


Operating System: Windows Server 2008 R2 Standard

IP Address: 10.10.10.74

Open Ports:

Services Responding:

Vulnerabilities Exploited:

Configuration Insecurities:

General Findings:


Back