DVR4
Last updated
Last updated
Source: Proving Grounds OS: Windows Community Rating: Hard
I started with the usual autorecon and got these ports: 22, 135, 139, 445, 5040, 8080, 49664 -> 49669
I checked port 8080 and found an interface for Argus Surveillance software, which is used for managing CCTVs. I played around for a while before searching online and finding a directory traversal vulnerability, CVE-2018-15745.
Using the PoC, I managed to get files from the system. Since SSH was open and accepted public key authentication, looking for SSH keys would be a good call, but first I needed to know the users. Luckily, in the web interface there was a tab for the users which listed two accounts: Viewer and Administrator.
I tested the directory traversal on System.ini to validate it was working before starting with the SSH keys:
Then I used:
I was able to retrieve the Viewer’s private key. Using this key, I logged into the system via SSH.
For privilege escalation, I checked the usual things, privileges, groups, etc. but nothing was found. I couldn’t even run systeminfo since I kept getting "Access Denied."
I then reviewed the installed applications and looked for Privilege Escalation CVEs for the Argus Surveillance DVR. I found two options (ExploitDB IDs: 45312 & 50130):
DLL Injection: This approach required GCC and write permissions to the program directory, which weren’t available.
Password Bruteforce Attack: The PoC indicated that encrypted passwords were stored in:
C:\ProgramData\PY_Software\Argus Surveillance DVR\DVRParams.ini
Navigating to this hidden directory (remember, ProgramData is hidden by default), I found two password hashes:
Password0=ECB453D16069F641E03BD9BD956BFE36BD8F3CD9D9A8
Password1=5E534D7B6069F641E03BD9BD956BC875EB603CD9D8E1BD8FAAFE
Using the provided PoC, I cracked both hashes. One password was "ImwatchingY0u
" and the other appeared as "14WatchD0g?
", the question mark indicating a missing special character.
I initially tried logging in via SSH with these credentials, but nothing worked.
After several attempts, I discovered that the correct second password was "14WatchD0g$
"
This granted me a shell as Administrator.
Directory Traversal: Exploiting traversal vulnerabilities can be invaluable for retrieving sensitive files like SSH keys and configuration files.
Hidden Directories: Always remember to check hidden directories (like ProgramData) when hunting for credentials.
Alternate Access Methods: If standard SSH login fails, using a runas command from CMD can work.