MidwintersTomb

CTF write ups and other sundries.


Project maintained by MidwintersTomb Hosted on GitHub Pages — Theme by mattgraham

Bastard

If we attempt to nmap the box non-stealthily, nmap drags and doesn’t respond in any reasonable time.

However, if we stealth scan, we get results.

If we open port 80 in a web browser, we get a login page for a Drupal site.

We have the option to create a new account, let’s see if what we can do with that.

If we create an account, it says that it needs to be approved by an administrator, as well as that it will send an e-mail, which clearly fails.

If we examine the results from Wappalyzer, we see that it’s running Drupal 7.

If we look around for CVE’s for Drupal 7, we find CVE-2018-7600, including this github: https://github.com/pimps/CVE-2018-7600

Let’s clone this repo, start up a webserver hosting netcat, as well as a netcat listener, and then launch this exploit.

Okay, let’s see if we have read rights to the user flag.

With that out of the way, let’s run systeminfo to find out more about the system.

If we run Windows Exploit Suggester, it looks like the system is vulernable to MS10-059, which we’re familiar with.

Additionally, if we do a whoami /priv on the box, we see that we have the SEImpersonatePrivilege permission.

So, let’s try Chimichurri first, and if that doesn’t work out, then we’ll try a potato attack.

Let’s copy over MS10-059.exe and start up a listener.

Looks like we’re good. Now let’s go grab the root flag.

See you in the next box.


Findings


Operating System: Windows Server 2008 R2 Datacenter

IP Address: 10.10.10.9

Open Ports:

Services Responding:

Vulnerabilities Exploited:

Configuration Insecurities:

General Findings:


Back