Granpa (Easy)

Lesson Learn

Report-Penetration

Vulnerable Exploit: Remote Buffer Overflow

System Vulnerable: 10.10.10.14

Vulnerability Explanation: This machine vulnerable to remote buffer overflow which could allow us to execute public exploit code and gain initial foothold on the machine.

Privilege Escalation Vulnerability: Out of dated kernel version

Vulnerability Fix: Apply patch to the system

Severity: High

Step to Compromise the Host:

Reconnaissance

Enumeration

Port 80 Microsoft-IIS/6.0

By going through port 80, we see the webpage the same as grandny machine.

The application use webdav protocol too. Let use davtest to check file extension that allow, seem like it doesn't allow anything. The method also not allow PUT and MOVE.

Searching for public exploit of webdav protocol.

On WebDAV 'ScStoragePathFromUrl' Remote Buffer Overflow matching the version and method PROPFIND allow as the script mention.

Exploitation

#1 Failure

On the python script we need to modify some parts.

We need to generate Window Reverse shell to replace on shell code. -v options to add var-name.

Once we run the exploit code but it doesn't work.

Let check for other script on public exploit code with specific vulnerable.

#2 Failure

This vulnerable has CVE-2017-726. We have other script from the github.

Proof of concept code: https://github.com/danigargu/explodingcan

We need to generate the reverse shell as it mentions.

After running this exploit also doesn't work.

#3 Success

Proof of concept code: https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269

We just download and no need to modify any part. Let start netcat listener on port 4444.

Privilege Escalation

Let start check on systeminfo and run windows-exploit-suggester.

Seem like the machine is window 2003 and SeImpersonatePrivilege is enabled.

Let start smb server and share the file to our victim machine.

On our victim machine copy nc.exe.

Next let run the exploit code that we have share on our machine. Let run netcat on port 6666.

Last updated