Optimum

Personal Rating: Easy

Enumeration

sudo nmap -A <IP>

nmap: PORT   STATE SERVICE VERSION
80/tcp open  http    HttpFileServer httpd 2.3
|_http-title: HFS /
|_http-server-header: HFS 2.3
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
<SNIP>

There is a html login at view-source: http://10.10.10.8/~login

HFS RCE

There seems to be a RCE for the tool HFT 2.3 that is running on the server. I found a Python PoV (CVE-2014-6287)

rejetto_hfs_exec

Credential Pillaging

There is a file called hfs.exe in the user folder

I ran LaZagne on the host to find credentials:

???????????? RDP Sessions
    SessID    pSessionName   pUserName      pDomainName              State     SourceIP
    1         Console        kostas         OPTIMUM                  Active    

Logon Id:                     223667

???????????? Looking for AutoLogon credentials
   Some AutoLogon credentials were found
    DefaultUserName               :  kostas
    DefaultPassword               :  kdeEjDowkS*

???????????? Enumerating Security Packages Credentials
  Version: NetNTLMv2
  Hash:    kostas::OPTIMUM:1122334455667788:9ff31d29534077ed01593e0b36129655:0101000000000000b6a223a7954cd90162427ab7f97a15d500000000080030003000000000000000000000000020000059e3276229747c33b040dbd9582ed5fc450d68281352578d738581afeeabf1650a00100000000000000000000000000000000000090000000000000000000000

This could have been done with other scripts and also with manual enumeration in Powershell for example if you needed to be more stealthy or LOL

Basic Privesc

For the hfs executable I found there was a privesc called ms16_032_secondary_logon_handle_privesc that I found after running a local exploit suggester.

Last updated