Post

HackTheBox_Optimum w/o Metasploit

HTB - Optimum

Image

Enumeration

Nmap Scan Results

Image

Homepage

Image

Vulnerabilities

https://www.exploit-db.com/exploits/39161

Exploitation Without Metasploit

Getting the Exploit File

Image

Checking the Script

Image

Hosting a Webserver with Netcat

Image

Making Files Available

Image

Setting Up Netcat

Image

Running the Exploit

1
python 39161.py 10.10.10.8 80

Image

User Flag

Image

Image

Privilege Escalation

System Information

Host Name:                 OPTIMUM  
OS Name:                   Microsoft Windows Server 2012 R2 Standard  
OS Version:                6.3.9600 N/A Build 9600  
OS Manufacturer:           Microsoft Corporation  
OS Configuration:          Standalone Server  
OS Build Type:             Multiprocessor Free  
Registered Owner:          Windows User  
Registered Organization:  

Product ID:                00252-70000-00000-AA535  
Original Install Date:     18/3/2017, 1:51:36  
System Boot Time:          9/8/2024, 3:17:56  
System Manufacturer:       VMware, Inc.  
System Model:              VMware Virtual Platform  
System Type:               x64-based PC  
Processor(s):              1 Processor(s) Installed.  
[01]: AMD64 Family 25 Model 1 Stepping 1 AuthenticAMD ~2445 Mhz  
BIOS Version:              Phoenix Technologies LTD 6.00, 12/11/2020  
Windows Directory:         C:\Windows  
System Directory:          C:\Windows\system32  
Boot Device:               \Device\HarddiskVolume1  
System Locale:             el;Greek  
Input Locale:              en-us;English (United States)  
Time Zone:                 (UTC+02:00) Athens, Bucharest  
Total Physical Memory:     4.095 MB  
Available Physical Memory: 3.527 MB  
Virtual Memory: Max Size:  5.503 MB  
Virtual Memory: Available: 4.971 MB  
Virtual Memory: In Use:    532 MB  
Page File Location(s):     C:\pagefile.sys  
Domain:                    HTB  
Logon Server:              \\OPTIMUM  
Hotfix(s):                 31 Hotfix(s) Installed.  
[01]: KB2959936  
[02]: KB2896496  
[03]: KB2919355  
[04]: KB2920189  
[05]: KB2928120  
[06]: KB2931358  
[07]: KB2931366  
[08]: KB2933826  
[09]: KB2938772  
[10]: KB2949621  
[11]: KB2954879  
[12]: KB2958262  
[13]: KB2958263  
[14]: KB2961072  
[15]: KB2965500  
[16]: KB2966407  
[17]: KB2967917  
[18]: KB2971203  
[19]: KB2971850  
[20]: KB2973351  
[21]: KB2973448  
[22]: KB2975061  
[23]: KB2976627  
[24]: KB2977629  
[25]: KB2981580  
[26]: KB2987107  
[27]: KB2989647  
[28]: KB2998527  
[29]: KB3000850  
[30]: KB3003057  
[31]: KB3014442  
Network Card(s):           1 NIC(s) Installed.  
[01]: Intel(R) 82574L Gigabit Network Connection  
Connection Name: Ethernet0  
DHCP Enabled:    No  
IP address(es)  
[01]: 10.10.10.8  
Hyper-V Requirements:      A hypervisor has been detected. Features required for Hyper-V will not be displayed.

Running the Local Windows Exploit Suggester

Image

Selecting the Exploit

Image

Hosting and Downloading the Exploit

Image

Image

Root Flag

Image

This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.