Netmon

Easy box from HTB, quite frankly user flag could have been hidden a bit more. Enumerating the server to obtain the bak files was quite a challenge. RCE at the end was basic

Learning:

  • Enumeration on FTP

  • Credential Hunt

  • Executing RCE manually or using msfconsole

Enumeration

nmap 10.129.230.176        
Starting Nmap 7.95 ( <https://nmap.org> ) at 2025-01-25 13:06 AEDT
Nmap scan report for 10.129.230.176
Host is up (0.029s latency).
Not shown: 994 closed tcp ports (reset)
PORT     STATE SERVICE
21/tcp   open  ftp
80/tcp   open  http
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
5985/tcp open  wsman

Nmap done: 1 IP address (1 host up) scanned in 0.69 seconds

Check ftp

image.png

User.txt lives can be found on Public user when you navigate through the FTP

Enumerating ftp to obtain user credentials:

  • Goal attempt to find old bak files

  • Find old config files

Users:

Bruteforce Attempt - Did not work

Navigating on FTP again looking for credential:

Old.bak Files

User Credential Found:

RCE

Vulnerable to RCE attacks

Another way obtaining RCE

In the PRTG Admin Panel head to:

  • Setup

  • Account Settings

  • Notifications

  • Inside the Notification setting head to Execute Program

  • Execute Program setting

  • In the parameter Key input the Rev-Shell

  • Make sure you select Demo exe notification - outfile.ps1in the Program File parameter

  • Save

  • Create netcat session `nc -lvnp 1234`

  • Ones uploaded Head to notifications

  • Click our created notification name pwn

    • On the far right hand side you will see a small box with a pen click that

    • Click the bell (if you hover on it it will say send notification)

    • RCE done!

  • Follow the block dots if lost

Popped it.

Last updated