Craft2
Think like a red teamer, not a CTF player. π΅οΈββοΈ
Summary
Found a web app with
.odt
file upload functionality on port 80.Crafted a malicious
.odt
payload to capture NTLM hashes using Responder.Cracked the captured hash to get valid credentials:
thecybergeek : winniethepooh
.Gained shell access by uploading a PHP reverse shell via SMB.
Used RunasCs to pivot between users and maintain access.
Couldnβt escalate privileges directly, so leveraged SQLβs
LOAD_FILE()
to exfiltrateproof.txt
.
π§΅Let's Unpack
πͺ Enumeration
πΉ Nmap Full Scan
πΉ Targeted Port Scan
Web app running on port 80
RPC and SMB (135, 445) open
Unknown service on 49666
Discovered domain
craft.offsec
and useradmin@craft.offsec
π Web Application Enumeration (Port 80)
Found upload functionality that accepted
.odt
files.Used
odt_badodt
payload via Metasploit to trigger NTLM auth leak.Captured hash using
responder
:Cracked using
john
βwinniethepooh
π¦ SMB Access
Verified credentials via CrackMapExec:
Discovered readable share: WebApp
Uploaded PHP reverse shell, caught with netcat.
π Initial Foothold
Uploaded reverse shell payload using SMB share access.
Executed payload through browser to catch shell.
Upgraded access with
RunasCs.exe
using captured creds:
π Privilege Escalation (Creative Alternative)
Couldnβt escalate via WinPEAS or service misconfigs.
Switched to clever SQL abuse using
LOAD_FILE()
:
Retrieved proof without SYSTEM access π―
π‘ Hints
Initial Foothold: Try uploading a
.odt
file embedded with an external resource to capture NTLM hashes via Responder.Privilege Escalation: If you hit a wall, explore creative data exfiltration. Sometimes reading the
proof.txt
without SYSTEM is all it takes.
Last updated
Was this helpful?