You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MachineIP: 10.10.10.63 - Windows
Difficulty: Medium
Category: OSCP Preparation
NMAP
▶ nmap -Pn -sS -p- 10.10.10.63 -T4 --min-rate 1000 -oN surface.nmapNmapscanreportfor 10.10.10.63
Host is up (0.18s latency).
Notshown: 65531 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
445/tcp open microsoft-ds
50000/tcp open ibm-db2
Nmap done: 1 IP address (1 host up) scanned in 126.42 seconds
▶ nmap -sC -sV -p 80,135,445,50000 10.10.10.63 -oN deep.nmapNmapscanreportfor 10.10.10.63
Host is up (0.18s latency).
PORTSTATESERVICEVERSION
80/tcp open http Microsoft IIS httpd 10.0
|_http-title: Ask Jeeves
| http-methods:
|_Potentiallyriskymethods: TRACE
|_http-server-header: Microsoft-IIS/10.0
135/tcp open msrpc Microsoft Windows RPC
445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP)
50000/tcp open http Jetty 9.4.z-SNAPSHOT
|_http-server-header: Jetty(9.4.z-SNAPSHOT)
|_http-title: Error 404 Not Found
Service Info: Host: JEEVES; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-time:
| date: 2023-05-05T11:01:04
|_start_date: 2023-05-05T10:53:38
|_clock-skew: mean: 4h59m36s,deviation: 0s,median: 4h59m35s
| smb2-security-mode:
| 311:
|_Messagesigningenabledbutnotrequired
| smb-security-mode:
| authentication_level: user
| challenge_response: supported
|_message_signing: disabled (dangerous,butdefault)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 53.18 seconds
HTTP 80
HTTP 50000
Content Discovery
▶ gobuster dir -u http://10.10.10.63:50000 -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt-t 25 -o http50000.gobuster
Jenkins
Initial Foothold
Jenkins Code Execution
Reverse Shell (Nishang)
Invoke-PowerShellTcp.ps1
Add the below line to the end of the nishang script to call the function Invoke-PowerShellTcp.
PSC:\Users\kohsuke\Desktop>systeminfoHostName: JEEVES
OS Name: Microsoft Windows 10 Pro
OS Version: 10.0.10586 N/A Build 10586
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Workstation
OS Build Type: Multiprocessor Free
Registered Owner: Windows User
Registered Organization:
Product ID: 00331-20304-47406-AA297
Original Install Date: 10/25/2017, 4:45:33 PM
System Boot Time: 5/5/2023, 6:53:24 AM
System Manufacturer: VMware,Inc.
SystemModel: VMware7,1
System Type: x64-based PC
Processor(s): 1 Processor(s) Installed.
[01]: Intel64 Family 6 Model 63 Stepping 2 GenuineIntel ~2300 Mhz
BIOS Version: VMware,Inc. VMW71.00V.16707776.B64.2008070230, 8/7/2020
Windows Directory: C:\WindowsSystemDirectory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume2
System Locale: en-us;English (United States)
Input Locale: en-us;English (United States)
Time Zone: (UTC-05:00) Eastern Time (US & Canada)
Total Physical Memory: 2,047 MB
Available Physical Memory: 1,155 MB
Virtual Memory: Max Size: 2,687 MB
Virtual Memory: Available: 1,747 MB
Virtual Memory: In Use: 940 MB
Page File Location(s): C:\pagefile.sysDomain: WORKGROUP
Logon Server: N/A
Hotfix(s): 10 Hotfix(s) Installed.
[01]: KB3150513
[02]: KB3161102
[03]: KB3172729
[04]: KB3173428
[05]: KB4021702
[06]: KB4022633
[07]: KB4033631
[08]: KB4035632
[09]: KB4051613
[10]: KB4041689
Network Card(s): 1 NIC(s) Installed.
[01]: Intel(R) 82574L Gigabit Network Connection
Connection Name: Ethernet0
DHCP Enabled: No
IP address(es)
[01]: 10.10.10.63
Hyper-V Requirements: A hypervisorhas been detected. FeaturesrequiredforHyper-Vwillnotbedisplayed.
Check Privileges
Enabled privileges for the current user.
PSC:\Users\kohsuke\Desktop>whoami/priv
SetImpersonatePrivilege is enabled so we’re very likely to get SYSTEM using Juicy Potato. However it is not the intended way to get SYSTEM on this machine.
Content Discovery
A bit of browsing quickly reveals a CEH.kdbx file in the Documents directory.
File Transfer
Transfer the CEH.kdbx file to attacker machine. Use netcat or impacket-smbserver for the file transfer.