# Nmap 7.93 scan initiated Mon May 22 19:51:06 2023 as: nmap -p21,22,135,139,3389,8089,33333 -sCV -o nmapscan -Pn 192.168.212.99
Nmap scan report for 192.168.188.99
Host is up (0.050s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp FileZilla ftpd
| ftp-syst:
|_ SYST: UNIX emulated by FileZilla
22/tcp open ssh OpenSSH for_Windows_8.1 (protocol 2.0)
| ssh-hostkey:
| 3072 8684fdd5432705cfa7f2e9e27570d5f3 (RSA)
| 256 9c93cf48a94e70f460dee1a9c2c0b6ff (ECDSA)
|_ 256 004ed73b0f9fe3744d04990bb18bdea5 (ED25519)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
3389/tcp open ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=nickel
| Not valid before: 2023-05-22T00:45:26
|_Not valid after: 2023-11-21T00:45:26
|_ssl-date: 2023-05-23T00:52:28+00:00; -1s from scanner time.
| rdp-ntlm-info:
| Target_Name: NICKEL
| NetBIOS_Domain_Name: NICKEL
| NetBIOS_Computer_Name: NICKEL
| DNS_Domain_Name: nickel
| DNS_Computer_Name: nickel
| Product_Version: 10.0.18362
|_ System_Time: 2023-05-23T00:51:23+00:00
8089/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Site doesn't have a title.
33333/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Site doesn't have a title.
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_smb2-security-mode: SMB: Couldn't find a NetBIOS name that works for the server. Sorry!
|_smb2-time: ERROR: Script execution failed (use -d to debug)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Mon May 22 19:52:29 2023 -- 1 IP address (1 host up) scanned in 83.17 seconds
When entering http://192.168.212.99:8089 in the web browser we see a web gui with three buttons, but when I visit http://192.168.212.88:33333 nothing seems to load only a message saying Invalid Token
I ran dibuster and nikto on both urls but they showed no interesting output, So next I inspected the code of port 8089
cmd used: curl -d "" -X POST http://192.168.166.99:33333/list-running-procs
And it worked we see a list of running processes, and looks like it contains some credentials. I tossed the password in cyberchef and decoded it to NowiseSloopTheory139
Using these credentials we can ssh to the host. Doing this I was able to grab the user flag and and snoop around the system, I tried some of the basic privilege escalation techniques but all were not successful. But I remember there was a ftp port that I totally forgot was in the nmap scan so I tried logging in as ariah.
There was only a pdf file, so I pulled it into my machine.
And the pdf is password protected so I ran pdfcrack on it and was able to get the password for it.
And the pdf showed some urls, but port 80 never showed in the nmap scan so I think I missed something in machine.
So I ssh back into the host and ran netstat since I sadly didn't think of that in the beginning. And the netstat showed port 80 opened and listening.
So since http://nickel/? looks like it takes some sort of query I passed a whoami command into it to see the output.
And ye it worked, so next best thing is lets just use a url encoded net command to add ariah to the admin group.