HTB - Artic

Artic

Getting Root:

  1. Discovered the box is running Adobe ColdFusion 8 on port 80

  2. Exploiting CVE-2010-2861 CVE-67047 we get a reverse shell

  3. used MS-010-059 for privilege escalation and got SYSTEM

Tools Used:

nmap, msfvenon, windows-exploit-suggester.py

Nmap

Exploiting Cold Fusion 8

Exploit

Cold Fusion 8 leaking the password

Cracking the Hash

2f635f6d20e3fde0c53075a84b68fb07dcec9b03:happyday

Admin Login

We have admin access and we can see the path of the application is: C:\ColdFusion8\wwwroot\CFIDE

Getting a Shell

Generate a shell with msfvenon

Uploading the shell to the target

Triggering the shell

http://10.10.10.11:8500/CFIDE/shell.jsp

Privilege Escalation

I don't want to use metasploit so I am going with the MS10-059

Compiled binary for MS10-059

Downloaded the executable to the victim

Executing the exploit

Get a reverse shell as SYSTEM

Root Flag

Last updated