Access
Summary
Only three ports open:
FTP (21)
,Telnet (23)
, andHTTP (80)
running Microsoft IIS 7.5.Anonymous login to FTP revealed two files: a password-protected ZIP and a backup
.mdb
database.Extracted valid user credentials from the
.mdb
file using an online viewer.Used
engineer
creds to unlock the ZIP file, which contained a.pst
email archive.The PST file disclosed new credentials for the user
security
:4Cc3ssC0ntr0ller
.Logged in via Telnet as
security
and enumerated stored credentials usingcmdkey
.Escalated privileges using
runas
with saved credentials forAdministrator
.
Enumeration
Discovered:
FTP (
21
) → Anonymous login enabled.Telnet (
23
) → Exposed NTLM and version info (Windows XP).HTTP (
80
) → Default MegaCorp landing page (no obvious attack surface).
Initial Foothold
FTP Enumeration
Downloaded files:
Access Control.zip
(password protected)backup.mdb
Used engineer
credentials to unlock ZIP file:
Unzipped archive revealed an Outlook PST file → Viewed using an online PST viewer:
Telnet Access
Successfully logged in!
Privilege Escalation
Step 1: Check Stored Credentials
Found saved credentials for:
ACCESS\Administrator
Step 2: Use runas
to Pivot as Administrator
runas
to Pivot as AdministratorUsed Netcat to get full shell:
Boom! SYSTEM shell obtained.
Last updated
Was this helpful?