HackTheBox_Arctic w/o Metasploit
HTB - Arctic
Enumeration
Nmap Scan Results
Homepage
Admin Page
Vulnerabilities
CFIDE Exploits
Directory traversal exploit:
https://www.exploit-db.com/exploits/50057
Additional directory traversal exploit:
https://www.exploit-db.com/exploits/14641
Exploitation w/o Metasploit
Directory Traversal Exploit
Visiting Directory
Hash Identification
Using Hashcat
Accessing Admin Page
We find the scheduled task page, where we can possibly upload our payload:
JSP Payload Upload
Create a JSP payload with msfvenom and upload it:
Starting a Simple Server
File Retrieval
Visiting Index
Getting a Shell
System Information
``` Host Name: ARCTIC
OS Name: Microsoft Windows Server 2008 R2 Standard
OS Version: 6.1.7600 N/A Build 7600
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Server
OS Build Type: Multiprocessor Free
Registered Owner: Windows User
Registered Organization:
Product ID: 55041-507-9857321-84451
Original Install Date: 22/3/2017, 11:09:45
System Boot Time: 6/8/2024, 6:24:51
System Manufacturer: VMware, Inc.
System Model: VMware Virtual Platform
System Type: x64-based PC
Processor(s): 1 Processor(s) Installed.
[01]: AMD64 Family 25 Model 1 Stepping 1 AuthenticAMD ~2595 Mhz
BIOS Version: Phoenix Technologies LTD 6.00, 12/11/2020
Windows Directory: C:\Windows
System Directory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume1
System Locale: el;Greek
Input Locale: en-us;English (United States)
Time Zone: (UTC+02:00) Athens, Bucharest, Istanbul
Total Physical Memory: 6.143 MB
Available Physical Memory: 5.097 MB
Virtual Memory: Max Size: 12.285 MB
Virtual Memory: Available: 11.288 MB
Virtual Memory: In Use: 997 MB
Page File Location(s): C:\pagefile.sys
Domain: HTB
Logon Server: N/A
Hotfix(s): N/A
Network Card(s):
1 NIC(s) Installed.
[01]: Intel(R) PRO/1000 MT Network Connection
Connection Name: Local Area Connection
DHCP Enabled: No
IP address(es)
[01]: 10.10.10.11
```
Exploit Suggestion
Put this information into a local Windows exploit suggester:
























Comments powered by Disqus.