Skip to main content
  1. CTF Writeups/

Arctic

·398 words·2 mins
Muqaram Majid
Author
Muqaram Majid
Just jotting down my thoughts

Arctic
#

Overview
#

  • OS: Windows
  • IP: 10.10.10.11
  • Difficulty: Easy
  • Platform: HackTheBox
  • OSCP: No
  • Lists: N/A

Summary
#

used a local exploit , certutil and hashcat done w/o ms.

Enumeration
#

nmap scan results

homepage

we find the admin page

Vulnerabilities
#

ok so they are using CFIDE . lets look up a exploit for this

https://www.exploit-db.com/exploits/50057

Directory traversal exploit

https://www.exploit-db.com/exploits/14641

Exploitation
#

  • without metasploit

lets use the 2010 directory traversal exploit

lets visit the directory specified

ok so with this we have the password but its encrypted using a hash value ,

lets identify the hash first

hmm alright , lets use hashcat now

and there we go , we got the password , now lets access the admin page

we find this scheduled task page , where we can possibly upload our payload

lets create a jsp payload with msfvenom and upload it

starting a simple server

now lets grab our file

on visiting index we find this

and there we go we got our shell . now time for some privilege escalation soon

this is our systems information

Host Name: ARCTIC OS Name: Microsoft Windows Server 2008 R2 Standard OS Version: 6.1.7600 N/A Build 7600 OS Manufacturer: Microsoft Corporation OS Configuration: Standalone Server OS Build Type: Multiprocessor Free Registered Owner: Windows User Registered Organization:

Product ID: 55041-507-9857321-84451 Original Install Date: 22/3/2017, 11:09:45 �� System Boot Time: 6/8/2024, 6:24:51 �� System Manufacturer: VMware, Inc. System Model: VMware Virtual Platform System Type: x64-based PC Processor(s): 1 Processor(s) Installed. [01]: AMD64 Family 25 Model 1 Stepping 1 AuthenticAMD ~2595 Mhz BIOS Version: Phoenix Technologies LTD 6.00, 12/11/2020 Windows Directory: C:\Windows System Directory: C:\Windows\system32 Boot Device: \Device\HarddiskVolume1 System Locale: el;Greek Input Locale: en-us;English (United States) Time Zone: (UTC+02:00) Athens, Bucharest, Istanbul Total Physical Memory: 6.143 MB Available Physical Memory: 5.097 MB Virtual Memory: Max Size: 12.285 MB Virtual Memory: Available: 11.288 MB Virtual Memory: In Use: 997 MB Page File Location(s): C:\pagefile.sys Domain: HTB Logon Server: N/A Hotfix(s): N/A Network Card(s):

1 NIC(s) Installed. [01]: Intel(R) PRO/1000 MT Network Connection Connection Name: Local Area Connection DHCP Enabled: No IP address(es) [01]: 10.10.10.11

lets put this in a local windows exploit suggester

lets use ms10-059

we will upload this with simple serv nd execute on the targets machine

lets execute it now

ok lts get out upgraded shell now

and now e can grab our flags

root flag

user flag