Kevin
Nmap Scan
$ nmap -sC -sV -p- --min-rate 10000 -Pn -oN nmap 192.168.155.45
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-07 14:19 +08
Warning: 192.168.155.45 giving up on port because retransmission cap hit (10).
Nmap scan report for 192.168.155.45
Host is up (0.0058s latency).
Not shown: 62733 closed tcp ports (conn-refused), 2790 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http GoAhead WebServer
|_http-server-header: GoAhead-Webs
| http-title: HP Power Manager
|_Requested resource was http://192.168.155.45/index.asp
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows 7 Ultimate N 7600 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open ssl/ms-wbt-server?
| rdp-ntlm-info:
| Target_Name: KEVIN
| NetBIOS_Domain_Name: KEVIN
| NetBIOS_Computer_Name: KEVIN
| DNS_Domain_Name: kevin
| DNS_Computer_Name: kevin
| Product_Version: 6.1.7600
|_ System_Time: 2024-06-07T06:20:19+00:00
|_ssl-date: 2024-06-07T06:21:46+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=kevin
| Not valid before: 2024-03-22T01:47:18
|_Not valid after: 2024-09-21T01:47:18
3573/tcp open tag-ups-1?
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49158/tcp open unknown
49160/tcp open unknown
Service Info: Host: KEVIN; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: mean: 1h23m59s, deviation: 3h07m49s, median: 0s
| smb2-time:
| date: 2024-06-07T06:20:19
|_ start_date: 2024-06-07T06:17:50
|_nbstat: NetBIOS name: KEVIN, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:ab:ef:65 (VMware)
| smb-os-discovery:
| OS: Windows 7 Ultimate N 7600 (Windows 7 Ultimate N 6.1)
| OS CPE: cpe:/o:microsoft:windows_7::-
| Computer name: kevin
| NetBIOS computer name: KEVIN\x00
| Workgroup: WORKGROUP\x00
|_ System time: 2024-06-06T23:20:19-07:00
| smb-security-mode:
| account_used: <blank>
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 2:1:0:
|_ Message signing enabled but not required
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 142.25 secondsInitial Access
Enum4Linux
Anonymous
Guest
Port 80
There is a HP Power Manager website running on that port.

After doing some researching, the default password is admin. So we will try put admin:admin.
Sure enough, we are able to access using the admin account.
After enumerating a while, we can see the version in the logs.

CVE-2009-3999
After searching online, there is a Buffer Overload exploit that we can use to get a reverse shell back.
We will need to generate the shell code for the reverse shell using msfvenom.
This is the modified exploit that we will be using the get the shell
After which, we will just need to run the exploit, we are able to get a reverse shell.

Last updated