HTB - Artic

Getting Root:
Discovered the box is running
Adobe ColdFusion 8on port 80Exploiting
CVE-2010-2861 CVE-67047we get a reverse shellused
MS-010-059for privilege escalation and got SYSTEM
Tools Used:
nmap, msfvenon, windows-exploit-suggester.py
Nmap
Exploiting Cold Fusion 8
Exploit

Cracking the Hash
2f635f6d20e3fde0c53075a84b68fb07dcec9b03:happyday
Admin Login
We have admin access and we can see the path of the application is: C:\ColdFusion8\wwwroot\CFIDE

Getting a Shell
Generate a shell with msfvenon
Uploading the shell to the target

Triggering the shell
http://10.10.10.11:8500/CFIDE/shell.jsp
Privilege Escalation
I don't want to use metasploit so I am going with the MS10-059
Compiled binary for MS10-059
Downloaded the executable to the victim
Executing the exploit
Get a reverse shell as SYSTEM
Root Flag
Last updated