HTB | Bastard
This is a Windows box. You can find it here.
Skill Learned
Enumerating CMS versions (Drupal)
Exploit modification
NMAP
IP: 10.10.10.9


Port 80
We found a Drupal website

In robots.txt we found CHANGELOG.txt


We found Drupal 7.54
Foothold/shell and Priv Esc
Found Drupalgeddon3 on searchsploit

Msf exploit was not working
Let's try this. Change the URL, endpoint_path, filename, data

and run

It gave us two files user.json and session.json

Let's try and crack administrator hash
It is taking too much time, We have an alternate way. Remember we have test.php on the server. We can curl

Let's use windows-exploit-suggester
copy systeminfo

update the database and run

Let's use this
We will copy the exe on the box

Let's run it


and we are nt\authority
Found user.txt

found root.txt

Last updated