Hack The Box:Buff(Windows)

 The nmap scan for this machine shows two ports open.

nmap scan

We get a website on port 8080 ,but the login form of this one is not vulnerable to sql injection.

webpage

This page does reveal that its using gym management system and this has an exploit available on searchsploit.

exploit

We can use this exploit simply and specify the target. But we get access to the web shell not the system so we can’t do much here and need to get a reverse shell on our machine.

web shell

From here we can get the user flag.

user flag

From our machine we send the netcat exe file and then use it to get a reverse shell on our system but we need to make sure we have a listener on our machine.

netcat reverse connection

We get an interactive shell on our machine which we can enumerate for priv esc.

interactive shell

When we enumerate we find out that there a port 8888 open on this machine internally .

netstat

After further enumeration we find that there is CloudMe_1112.exe file which is running on this port.

This CloudMe has a buffer overflow vulnerability which is available on searchsploit.

cloudme exploit

But to execute this we need to tunnel so we will use chisel. We will make our system a server and the target a client. On our machine we do this:

chisel server

Now we need to transfer the chisel’s exe file and run a client .

chisel client

We established a connected which we can confirm on our machine.

netstat

Now we just need to generate payload and replace it in the script.

generating payload

Then we just run the script but we need to make sure we have netcat listener on our machine.

running exploit

We get the shell as administrator and we get the root flag.

root flag

Happy hacking!!!!

Comments

Popular posts from this blog

HackTheBox:Blunder(Linux)

HackTheBox:Tabby(Linux)

Legacy:Hack The Box(Windows)