12/2020

Description:

Target IP: 10.10.10.81.

The following machine is a Windows box that hosts an introduction website of a company. Threat actor got initial access to the monitor.bart.htb by brute-forcing the account discovered from the forum page. A combination of log injection and local file inclusion that led to server-side code execution gave the attacker a shell to the victim machine under iusr privileges. After upgrading that 32-bit shell to a 64-bit one, the threat actor was able to run some standards enumerate queries and got administrator auto logon credential. The attacker then mapped the entire C partition to drive letter x in order to inspect it with iusr account.

Difficulty:

medium

Flags:

User: 625b6c7aa299599acae0125d3af3830f

Root: 0074a38e6eac2d3785741713b3bfa2dc

Enumeration

Nmap port scan result.

Nmap port scan result.

Nmap service scan result.

Nmap service scan result.

! Discover service: HTTP (80) MS IIS server.

Examining the web application on port 80.

Examining the web application on port 80.

Employees identity information is available on the web application.

Employees identity information is available on the web application.

! Discover internal email: [email protected], [email protected], [email protected] .

The company has recently hired a new employee – Daniella Lamborghini.

The company has recently hired a new employee – Daniella Lamborghini.

! Daniella internal email is probably [email protected]

Inspecting the web site source code reveals another employees - Harvey Potter.

Inspecting the web site source code reveals another employees - Harvey Potter.

Harvey information was commented out because it breaks the layout.

Harvey information was commented out because it breaks the layout.