🧊Ice

Deploy & hack into a Windows machine, exploiting a very poorly secured media server.

1. Reconnaissance

1.1 Nmap

  • Here we find that there is as http server running Icecast streaming media server on an unusual pot 8000

2. Gaining access

2.1 Metasploit

  • Searching metasploit for icecast exploits

  • We are logged in as user Dark with no privileges

3. Privilege Escalation

3.1 UAC Bypass

  • Running metasploit module post/multi/recon/local_exploit_suggester in the meterpreter session for finding any potential vulnerabilities

  • We find the target is vulnerable to the exploit/windows/local/bypassuac_eventvwr module

  • Backgrounding the current meterpreter session with Ctrl + Z, we use the suggested module and provide the session number of our backgrounded session

  • After using the module, we find that there are certain processes running as NT AUTHORITY\SYSTEM which is equivalent to the root user in linux.

  • We can also verify this if we could get names of privileged proccecess when running the getprivs command in the meterpreter session.

  • Right now we are the user Dark, but we can migrate to NT AUTHORITY\SYSTEM by using the migrate command and specifying the process name of any process running as NT AUTHORITY\SYSTEM.

  • Now we are NT AUTHORITY\SYSTEM

3.2 Kiwi

  • Mimikatz is a rather infamous password dumping tool that is incredibly useful. Loading using the command load kiwi (Kiwi is the updated version of Mimikatz)

  • using the command creds_all in kiwi to list all credentials

  • All the password hashes and passwords are dumped.

Last updated