βœ…Optimum (Easy)

Lesson Learn

Report-Penetration

Vulnerable Exploit: Remote Code Execution

System Vulnerable: 10.10.10.8

Vulnerability Explanation: The machine is vulnerable to remote code execution which exploit code was publicly.

Privilege Escalation Vulnerability: Out of dated version

Vulnerability Fix:

Severity:

Step to Compromise the Host:

Reconnaissance

Enumeration

We just found only 1 port open on the machine. We can see the version of the application is HTTPFileServer 2.3.

By searching on google, this version is vulnerable to remote command execution attack due to a poor regex in the file ParserLib.pas. It allow remote attacks to execute arbitrary programs via %00 sequence in a search action.

Proof of Concept Code: https://www.exploit-db.com/exploits/49584

Let start manual test first, inserting %00 in the search field and send it through burp proxy.

Let start tcpdump to capture the traffic coming through tun0 (VPN connection).

Let start execute command ping to our kali machine through burp and see the traffic. As we can the traffic coming from our machine ping to our kali machine.

#1 Exploitation (Manual)

Let start replace ping command to execute remote code execute script. We can grab and edit reverse shell script from nishang which running in powershell script.

Let start netcat listener on port 4444 and start up HTTP Server with python3 to share file.

Then, execute command on burp to download and execute the reverse shell script.

#2 Exploitation (Script)

Proof of concept code: https://www.exploit-db.com/exploits/49584

Searching for public exploit, we found python script which could exploit this vulnerable.

We just need to replace IP address and Port accordingly to our situation.

Let start our netcat listener on port 4444 and execute the payload.

#1 Priv-Esc

We can enumerating with Windows-Exploit-Suggester.py to check for vulnerable.

Proof of Concept Code: https://www.exploit-db.com/exploits/41020/

Going through the exploit-db, it provides with the link to download binary file to execute on window. We can download and transfer it to our victim machine.

Last updated