Devel

Devel - 10.10.10.5

Target Enumeration:

OS: Windows

IP: 10.10.10.5

User: 9ecdd6a3aedf24b41562fea70f4cb3e8

Root: e621a0b5041708797c4fc4728bc72b4b

Ports / Services / Software Versions Running

21/tcp open ftp Microsoft ftpd
80/tcp open http Microsoft IIS httpd 7.5

Vulnerability Exploited:

Anonymous ftp upload to web root with aspx shell

Privilege Escalation:

windows/local/ms10_015_kitrap0d

This module will create a new session with SYSTEM privileges via the KiTrap0D exploit by Tavis Ormandy. If the session in use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll, and is not supported on x64 editions of Windows.

Exploiting the host:

Nmap

Anonymous login allowed.

Upload a test file to see if it is executed

Test to see if file is accessible remotely:

Now generate and an aspx shell.

Open msfconsole and set a listener.

Upload vdk.aspx via anonymous ftp

Request the file with curl

Watch your listener spawn a shell.

Enumerate the system for privesc opportunities with local exploit suggester.

Use windows/local/ms10_015_kitrap0d

Execute the exploit

Check we have system access

Collect the flags: