Netmon
Write up for the HTB machine 'Netmon'
1. Initial recon
1.1. nmap
nmap -sC -sV 10.10.10.152
2. user.txt
from the nmap scan we can see that anonymous ftp login is allowed, meaning we can ftp into the machine without any credentials so we can simply run ftp 10.10.10.152
and input the credentials anonymous:anonymous
to log in. from there we can navigate to our user flag at /Users/Public/user.txt
and then run get user.txt
to download the file and read the flag.
3. root.txt
Looking at the web application in the browser we can see PRTG Network Monitor
is running with a login. so let's enumerate the file system with our ftp access to try and find some credentials.
from ftp we are able to find the directory /ProgramData/paessler/PRTG Network Monitor
downloading the 3 configuration files
we are able to enuerate a username prtgadmin
and also find a password in PRTG Configuration.old.bak
which is PrTg@dmin2018
Trying the credentials prtgadmin:PrTg@dmin2018
in the web app don't work :(
fortunate for us the admin of this site isn't very good with their password management so we can easily guess PrTg@dmin2019
as the new password (considering PrTg@dmin2018
came from the old configuration), and good news for us, that works.
3.1. metasploit
searching the version of the software prtg network 18.1.37.13946
on the dashboard of the web application we can see that there is an RCE vulnerability.
spinning up msfconsole
we simply run the commands
once we have our meterpreter shell we can run the commands
which will reveal that we are nt authority\system
the root flag can be found at C:\Users\Administrator\Desktop
and read using type "root.txt"
Last updated