Kevin

Nmap Scan

$ nmap -sC -sV -p- --min-rate 10000 -Pn -oN nmap 192.168.155.45
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-07 14:19 +08
Warning: 192.168.155.45 giving up on port because retransmission cap hit (10).
Nmap scan report for 192.168.155.45
Host is up (0.0058s latency).
Not shown: 62733 closed tcp ports (conn-refused), 2790 filtered tcp ports (no-response)
PORT      STATE SERVICE            VERSION
80/tcp    open  http               GoAhead WebServer
|_http-server-header: GoAhead-Webs
| http-title: HP Power Manager
|_Requested resource was http://192.168.155.45/index.asp
135/tcp   open  msrpc              Microsoft Windows RPC
139/tcp   open  netbios-ssn        Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds       Windows 7 Ultimate N 7600 microsoft-ds (workgroup: WORKGROUP)
3389/tcp  open  ssl/ms-wbt-server?
| rdp-ntlm-info: 
|   Target_Name: KEVIN
|   NetBIOS_Domain_Name: KEVIN
|   NetBIOS_Computer_Name: KEVIN
|   DNS_Domain_Name: kevin
|   DNS_Computer_Name: kevin
|   Product_Version: 6.1.7600
|_  System_Time: 2024-06-07T06:20:19+00:00
|_ssl-date: 2024-06-07T06:21:46+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=kevin
| Not valid before: 2024-03-22T01:47:18
|_Not valid after:  2024-09-21T01:47:18
3573/tcp  open  tag-ups-1?
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49158/tcp open  unknown
49160/tcp open  unknown
Service Info: Host: KEVIN; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 1h23m59s, deviation: 3h07m49s, median: 0s
| smb2-time: 
|   date: 2024-06-07T06:20:19
|_  start_date: 2024-06-07T06:17:50
|_nbstat: NetBIOS name: KEVIN, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:ab:ef:65 (VMware)
| smb-os-discovery: 
|   OS: Windows 7 Ultimate N 7600 (Windows 7 Ultimate N 6.1)
|   OS CPE: cpe:/o:microsoft:windows_7::-
|   Computer name: kevin
|   NetBIOS computer name: KEVIN\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2024-06-06T23:20:19-07:00
| smb-security-mode: 
|   account_used: <blank>
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   2:1:0: 
|_    Message signing enabled but not required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 142.25 seconds

Initial Access

Enum4Linux

Anonymous

Guest

Port 80

There is a HP Power Manager website running on that port.

After doing some researching, the default password is admin. So we will try put admin:admin.

Sure enough, we are able to access using the admin account.

After enumerating a while, we can see the version in the logs.

CVE-2009-3999

After searching online, there is a Buffer Overload exploit that we can use to get a reverse shell back.

We will need to generate the shell code for the reverse shell using msfvenom.

This is the modified exploit that we will be using the get the shell

After which, we will just need to run the exploit, we are able to get a reverse shell.

Last updated