Legacy
OS: Windows, Difficulty: Easy, IP: 10.10.10.4
Initial Enumeration
# Nmap 7.70 scan initiated Sun Jul 7 13:32:11 2019 as: nmap -sV -sC -O -A -p 139,445,3389 -oN O-detailed 10.10.10.4
Nmap scan report for 10.10.10.4
Host is up (0.29s latency).
PORT STATE SERVICE VERSION
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows XP microsoft-ds
3389/tcp closed ms-wbt-server
Device type: general purpose|specialized
Running (JUST GUESSING): Microsoft Windows XP|2003|2000|2008 (92%), General Dynamics embedded (87%)
OS CPE: cpe:/o:microsoft:windows_xp cpe:/o:microsoft:windows_server_2003 cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_server_2008::sp2
Aggressive OS guesses: Microsoft Windows XP SP2 or Windows Small Business Server 2003 (92%), Microsoft Windows 2000 SP4 or Windows XP SP2 or SP3 (92%), Microsoft Windows XP SP2 (92%), Microsoft Windows Server 2003 (90%), Microsoft Windows XP SP3 (90%), Microsoft Windows 2000 SP4 (90%), Microsoft Windows XP Professional SP3 (90%), Microsoft Windows XP SP2 or SP3 (90%), Microsoft Windows XP Professional SP2 (90%), Microsoft Windows XP SP2 or Windows Server 2003 (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OSs: Windows, Windows XP; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp
Host script results:
|_clock-skew: mean: -4h36m12s, deviation: 2h07m16s, median: -6h06m12s
|_nbstat: NetBIOS name: LEGACY, NetBIOS user: <unknown>, NetBIOS MAC: 00:50:56:a2:f6:ff (VMware)
| smb-os-discovery:
| OS: Windows XP (Windows 2000 LAN Manager)
| OS CPE: cpe:/o:microsoft:windows_xp::-
| Computer name: legacy
| NetBIOS computer name: LEGACY\x00
| Workgroup: HTB\x00
|_ System time: 2019-07-07T07:56:15+03:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_smb2-time: Protocol negotiation failed (SMB2)
TRACEROUTE (using port 3389/tcp)
HOP RTT ADDRESS
1 297.05 ms 10.10.14.1
2 297.04 ms 10.10.10.4
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 7 13:36:40 2019 -- 1 IP address (1 host up) scanned in 269.52 seconds2 Important and vulnerable services are exposed on this server SMB and RDP, and as evident from the SMB banner the server is Windows XP. This concludes that these should be vulnerable to Eternal Blue (MS17-010) and RDP Use-after-free (MS12-020) attacks, however both failed spectacularly.
After this I had to utilise nmap to search for more vulnerabilities in this Windows XP Box using the following command.
This got me one more exploit MS08-067 RCE
This exploit logged me in as NT Authority/System as I was able to explore the Administrator directory as well.
User Own
Root Own
Learning Outcome
With this box I learned that nmap should also be utilised to find vulnerabilities in the boxes rather than just searchsploit, msf, or any other utility. Nmap delivers some quality results as well. Later after solving the box, I found that this fellow over here made Eternal Blue work on the box as well. [https://0xdf.gitlab.io/2019/02/21/htb-legacy.html]
Last updated
Was this helpful?