Box Overview

This box is quite old by the time I’m doing it, some of the tags that give it away are HFS, Python, and Outdated Software. Hopefully it’s not another Metasploit but there’s always a more fun alternate solution in that case.

Reconnaissance


Nmap Scan

The nmap scan surpisingly only found 1 port open, I won’t bother with a UDP scan until a little later if I really can’t find anything. But I doubt it’ll be necessary, especially on an old easy box.

It does report that it’s an old HttpFileServer running on httpd 2.3.

Gobuster Scan

I didn’t find anything so I won’t even include a screenshot for this part.

Walking the Application

We already know the application is running this HttpFileServer (which was probably what HFS in HTB meant), so my expectations are already set for an old-looking application with little to no JavaScript.

Pretty standard stuff, some basic info like Server time and uptime is present and there is an option to login.

The login option gives this web pop-up login screen.

I know the that that the server is running a really old HttpFileServer so there might be some nice exploits that can be exploited.

I’m feeling a bit tired today so the “Remote Command Execution (Metasploit)” one looks interesting. I know this isn’t OSCP valid but some meterpreter practice can’t hurt.

Exploitation

We can jump right into meterpreter and select the relevant exploit.

That was pretty quick. This shell gives me access to the standard user account, so I’m going to start by trying the linux_exploit_suggester.

Some basic setup, the exploit used creates multiple sessions automatically so I needed to use SESSION 3.

The modules gives me back two possible options, a bypassuac_eventvw exploit and a ms16_032_secondary_logon_handle_privesc.

Okay that one didn’t work, time to try the other one.

Okay cool that one did work. This was kind of a cheesy way to get root but it worked to get the flags.


<
Previous Post
Setting up OpenBSD in VMware Fusion
>
Blog Archive
Archive of all previous blog posts