Rabbit
Rabbit - 10.10.10.71
Target Enumeration:
OS: Windows
IP: 10.10.10.71
User: c6f45142bea818fe729cef32342aae9c
Root: 0b2ded66e5a49dd1620be30110f43d54
Ports / Services / Software Versions Running
Too many to list: :/
8080 - sqli
80 - owa - client side exploit
Vulnerability Exploited:
Sqli to get the users email hash and login via owa allows you to send a malicious .odt file to the manager which gives you a reverse shell
Privilege Escalation:
Apache running as system service > reverse nc php file
Exploiting the host:
Nmap
Hundreds of ports open so wasted a lot of time enumerating them and knocking out the FP’s.
Gobuster on http://10.10.10.71:8080/
Eventually got to complain which is “Complain Management System”
Searchsploit leads us to sqli
Which leads us to:
Register a user and login
Discover content with burp to see if there are any other functions/ pages uncovered
Looking at the other exploit it leads us to https://www.exploit-db.com/exploits/42968/
Rebuild in the browser:
Vulnerable to sqli so save request to run through sqlmap or do manually.
Sqlmap on the request with * at injection point
Looks like it is vulnerable.
Enumerate the databases etc until you know what you are looking for
Dump the users table
Results:
So we have some users and passwords now we need to work out where they work
After testing authentication with all the services running on the machine one appears to be OWA credentials:
Looks like we need to send some form of malicious document to “management”
There is also some information about potential privesc headaches
We need to find out who management are
After a while we found a user to email in the deleted items folder
And a full email address
Now we need to build a payload via metapsploit. (OSCP ;)
Annoyingly attaching the report would not work in firefox so I switched to chrome
Sent the report and waited, client side exploits are a pain and can be quite annoying to get to work and I have seen it before when I have done the correct exploit yet it has not worked for some reason so always try a few different exploits as our report may have been picked up by windows defender.
Looking at the other emails we get a hint
Now look for an openoffice exploit
Se the options as follows:
Send the malicious odt file
Wait again :/
This did not work so we need to create our own and possibly find a way around the restrictions
Create a payload locally (may get picked up by windows defender) and host on your webserver just to see if we can run commands via our odt file and if we are lucky get a shell.
This part took me many attempts to get right and I cannot be 100% certain about which payload actually worked as I sent around 30 emails to the user. I eventually reverted the machine just incase as I was sure I was on the right lines.
Modify the macro in the odt file to:
Send the report and wait
Grab the users file
C6f45142bea818fe729cef32342aae9c
Enumerating the system tells us that apache is running as system
Generate a meterpreter php payload
Download to the C:\wamp64\www\ dir
Request the shell via curl
We get a session but it dies almost instantly probably due to AV
So write a manual rev shell using nc.exe which we have already downloaded
Create and host the following files on your webserver
Script.bat
Download them both to the machine in the www dir
Start a nc listener on port 53
Request the file via the browser
Check your listener
Now you have a root shell so collect the flags
Last updated