HTB Blue Writeup
Enumeration
First I do an nmap scan nmap -sC -sV -oA scan 10.10.10.40. Here’s what it outputs:
So doing research on the ports, OS versions, SMB version, and potential exploits, I found out about EternalBlue. Here’s the link for the Microsoft webpage explanation here. Cross checking, I see this machine can be used using Eternalblue (and thus the name of this box).
Exploitation
So for this exploit we’ll use the metasploit module: exploit/windows/smb/ms17_010_eternalblue
Opening up metasploit and setting up the module:
Also we see that the RHOST (remote host) is currently set to nothing so I set it to 10.10.10.40 (the IP of the box).
When we run the exploit, we successfully get a shell inside the box:
Doing a whoami check confirms we got basically administrator access (nt authority\system has the highest priviledges on the local system).
Thus we find the flags:
root: C:\Users\Administrator\Desktop\root.txt
user: C:\Users\haris\Desktop\user.txt
Last updated