Netmon
Easy box from HTB, quite frankly user flag could have been hidden a bit more. Enumerating the server to obtain the bak files was quite a challenge. RCE at the end was basic
Learning:
Enumeration on FTP
Credential Hunt
Executing RCE manually or using msfconsole
Enumeration
nmap 10.129.230.176
Starting Nmap 7.95 ( <https://nmap.org> ) at 2025-01-25 13:06 AEDT
Nmap scan report for 10.129.230.176
Host is up (0.029s latency).
Not shown: 994 closed tcp ports (reset)
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
5985/tcp open wsman
Nmap done: 1 IP address (1 host up) scanned in 0.69 seconds
Check ftp

User.txt lives can be found on Public user when you navigate through the FTP
Enumerating ftp to obtain user credentials:
Goal attempt to find old bak files
Find old config files
Users:
Bruteforce Attempt - Did not work
Navigating on FTP again looking for credential:

User Credential Found:
RCE

Another way obtaining RCE
In the PRTG Admin Panel head to:
Setup
Account Settings
Notifications

Inside the Notification setting head to Execute Program

Execute Program setting
In the parameter Key input the Rev-Shell
Make sure you select
Demo exe notification - outfile.ps1in the Program File parameterSave
Create netcat session `nc -lvnp 1234`
Ones uploaded Head to notifications
Click our created notification name
pwnOn the far right hand side you will see a small box with a pen click that
Click the bell (if you hover on it it will say send notification)
RCE done!

Follow the block dots if lost

Popped it.
Last updated