Netmon
Personal Rating: Easy
Last updated
Personal Rating: Easy
Last updated
The initial nmap scan shows many open ports that indicate a Windows DC:
sudo nmap -p- -sV <IP>
I found this webpage http://<TARGETIP>/index.htm where PTRG can be read as service name. It is a login form. During research about that service a vulnerability stands out, which should work for the exact version of the service that is running on the machine:
This reddit post contains all information needed to exploit the exposed ftp share.
The old config contains the user prtgadmin with the password PrTg@dmin2018
The config is huge, but searching for "password" in kate the password was found quickly.
The new backup was last edited in 2019, so I tried PrTg@dmin2019 which worked as password for the login form.
I tried this payload: windows/http/prtg_authenticated_rce
but it didn't work.
I found out that theres a vulnerability that you can inject scripts into the Execute Script parameters of "Notifications" in the PRTG Admin Center.
From there I could make the new user an admin and log onto the machine with that user. I also found an ssh key for the existing admin user.