Access – HackTheBox

Access – 10.10.10.98

Target Enumeration:

OS: Windows

IP: 10.10.10.98

User: ff1f3b48913b213a31ff6756d2553d38

Root: 6e1586cc7ab230a8d297e8f933d904cf

Ports / Services / Software Versions Running

FTP

Telnet

HTTP

Vulnerability Exploited:

Anonymous ftp access allows you to download a mdb file which once reviewed gives you a password for the zip file.

Once zip file is extracted there is a telnet password for security in the outlook backup file.

Privilege Escalation:

Runas to get reverse nc shell.

Exploiting the host:

Nmap

image

Anonymous access to FTP allowed so download the files

image

Open the mdb file with the following url image

image

Found the password within the backup.mdb file access4u@security

image

Use this password to extract access control.zip

Which gives you what looks to be an outlook backup

image

Install outlook in a windows vm and import the pst file

image

Use these creds to login via telnet security:4Cc3ssC0ntroller

image

Grab the user flag

image

User is low priv

There is a sql service script within the C:\temp dir

image

Which has credentials of sa:htrcy@HXeryNJCTRHcnb45CJRY

Good chance we have to open the mssql service and exploit that to get root

Can’t find sql server running so must be a false positive/ rabbit hole.

Download nc to the machine and run with runas

image

Receive a root shell

image

Collect your flag

image