Blueprint
https://tryhackme.com/room/blueprint
Nmap
Starting out we check port 8080 and find that a web server is running. The root page presents us with an index page where we see the commerce system oscommerce 2.3.4 is installed.
A simple preliminary check with searchsploit
shows multiple vulnerabilities with this version.
Searching for Remote Code Execution exploits on GitHub shows a PoC from the user nobodyatall648.
GitHub: https://github.com/nobodyatall648/osCommerce-2.3.4-Remote-Command-Execution
Which has the following definition for the exploit:
"Exploiting the install.php finish process by injecting php payload into the db_database parameter & read the system command output from configure.php".
Using the example provided on GitHub we clone the repo and run with the following syntax:
After gaining a SYSTEM level shell on the target system we now aim to gain a proper reverse shell. As well as dump the hashes from the target system.
With SYSTEM access we change the local administrator password.
Then use crackmapexec
to dump the NTLM hashes from the SAM file.
After dumping hashes from SAM we then use psexec.py
to gain shell access to the target system.
Last updated