Post

retro

Introduction

Information Gathering

Started with an Nmap scan and discovered that two ports were open:

1
nmap -Pn -sV -A -vv -oN nmap_scans 10.10.104.203

Alt text

Here are the details:

  • Port 80 (HTTP): Likely used for web traffic.
  • Port 3389 (RDP): Identified as Remote Desktop Protocol (RDP).

Directory Enumeration

Did dirsearch but got nothing

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
┌──(root㉿kali)-[/home/sire/Downloads]
└─# dirsearch -u  http://10.10.104.203 --exclude-status 403,404

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460

Output File: /home/sire/Downloads/reports/http_10.10.104.203/_24-02-14_14-36-09.txt

Target: http://10.10.104.203/

[14:36:09] Starting: 

Task Completed

but when I tried feroxbuster I got something a hidden germ /retro

feroxbuster -u http://10.10.104.203

Alt text

I checked the target website using my web browser and found out it was running on WordPress: Alt text

Then, I tried using a tool called WPScan to learn more, but I got an error message:

1
2
can Aborted: The URL supplied redirects to http://localhost/retro/wp-login.php?redirect_to=http://10.10.104.203/retro/wp-admin/&reauth=1. Use the --ignore-main-redirect option to ignore the redirection and scan the target, or change the --url option value to the redirected URL.

Still, I didn’t give up. I looked around the website carefully and found some potential login details:

  • Username: wade
  • Password: parzival

Alt text

Port 3389

With the credentail acqured I tried to connect to the machine using the remote protocol port with the following command:

1
xfreerdp /v:10.10.104.203 /u:wade /p:parzival /cert:ignore +clipboard /dynamic-resolution /drive:share,/home/sire/Documents/CTFs/TryHackMe/Retro /size:1600x980

and walla, we are in

Vulnerability Analysis

Alt text

After pockig around I came to this history that was in chrom browser CVE 2019-1388 Alt text

After doing some googling I found this

Alt text

There was this file we had to download to the machine but we had no internet and looking at the trash folder I found it

Alt text

Exploitation

I copied the file to the desktop and opened it, going to more brought me here

To view the certificate details:

Click “Show more details” to expand the dialog box. Select “Show information about the publisher’s certificate.” A new window will appear with the certificate properties. Under the General tab, note the issuer is VeriSign Commercial Software Publishers CA. Click the link to view more information about the Issuer. Alt text

To exploit:

Choose to open the link with either Google Chrome or Internet Explorer. Opt for Internet Explorer for reliability. Internet Explorer will open as SYSTEM. Close other windows and wait for Internet Explorer to load. You may encounter a “This page can’t be displayed” error due to the lack of internet connection.

Alt text

Crt + s to save the file and browse to C:\Windows\System32 where you will find cmd, run cmd by default and you will be root

Alt text

🐞 CVE 2019-1388

This post is licensed under CC BY 4.0 by the author.