Optimum

Personal Rating: Easy

Enumeration

sudo nmap -A <IP>

nmap: PORT   STATE SERVICE VERSION
80/tcp open  http    HttpFileServer httpd 2.3
|_http-title: HFS /
|_http-server-header: HFS 2.3
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
<SNIP>

There is a html login at view-source: http://10.10.10.8/~login

HFS RCE

There seems to be a RCE for the tool HFT 2.3 that is running on the server. I found a Python PoV (CVE-2014-6287)

rejetto_hfs_exec

Credential Pillaging

There is a file called hfs.exe in the user folder

I ran LaZagne on the host to find credentials:

This could have been done with other scripts and also with manual enumeration in Powershell for example if you needed to be more stealthy or LOL

Basic Privesc

For the hfs executable I found there was a privesc called ms16_032_secondary_logon_handle_privesc that I found after running a local exploit suggester.

Last updated