Driver HTB Walkthrough

Nov 12, 2024    #box   #htb   #easy   #windows   #ldap   #responder   #cfs   #printnightmare   #cve-2021-1675   #download-cradle  

Driver Hack The Box Walkthrough/Writeup:

How I use variables & Wordlists:

1. Enumeration:

NMAP:

Basic Scans:

Comprehensive Scans:

SMB 445:

Attempting to connect with NULL & Guest sessions:

RPC:

Web 80:

Website Overview:

Enumerating Injection Points:

Directory Enumeration the web-server using ffuf:

2. Foothold:

Using an SCF File to get a users NTLM hash:

As this host allows uploads it may be possible to upload a malicious .scf file to force them to authenticate back to our attack host and send us their NTLM hash.

SCF (Shell Command File) Primer:
SCF Exploit Explained:

Cracking Tony’s hash with hashcat:

Enumerating Users with RPC:

Enumerating as Tony:

3. Privilege Escalation:

Discovering the host is vulnerable to PrintNightmare CVE-2021-1675:

Adding an Admin User using PrintNightmare CVE-2021-1675:

Lessons Learned:

What did I learn?

  1. It took me a long time to see you could upload an SCF so long as it was being accessed from a share/etc it would work.

What silly mistakes did I make?

  1. Not too many, may be getting better, here’s hoping.

Sign off:

Remember, folks as always: with great power comes great pwnage. Use this knowledge wisely, and always stay on the right side of the law!

Until next time, hack the planet!

– Bloodstiller

– Get in touch bloodstiller at proton dot me



Next: Timelapse HTB Walkthrough