windowsKevin

Enumeration:

Port Scanning:

┌──(kali㉿kali)-[~/…/Machines/OffsecPG/Practice/Kevin]
└─$ sudo nmap -sCV -p- --min-rate 4000 -oA nmap/services -vv 192.168.115.45
Starting Nmap 7.95 ( https://nmap.org ) at 2025-11-10 01:55 EST
Nmap scan report for 192.168.115.45                                                                                                                                         
Host is up, received echo-reply ttl 125 (0.12s latency).                                                                                                                    
Scanned at 2025-11-10 01:55:28 EST for 101s                                           
Not shown: 65523 closed tcp ports (reset)                                             
PORT      STATE SERVICE      REASON          VERSION                                  
80/tcp    open  http         syn-ack ttl 125 GoAhead WebServer                        
| http-title: HP Power Manager                                                        
|_Requested resource was http://192.168.115.45/index.asp                              
| http-methods:                                                                                                                                                             
|_  Supported Methods: GET HEAD                                                                                                                                             
|_http-server-header: GoAhead-Webs                                                                                                                                          
135/tcp   open  msrpc        syn-ack ttl 125 Microsoft Windows RPC                                                                                                          
139/tcp   open  netbios-ssn  syn-ack ttl 125 Microsoft Windows netbios-ssn                                                                                                  
445/tcp   open  microsoft-ds syn-ack ttl 125 Windows 7 Ultimate N 7600 microsoft-ds (workgroup: WORKGROUP)                                                                  
3389/tcp  open  tcpwrapped   syn-ack ttl 125                                                                                                                                
| rdp-ntlm-info:                                                                                                                                                            
|   Target_Name: KEVIN                                                                                                                                                      
|   NetBIOS_Domain_Name: KEVIN                                                                                                                                              
|   NetBIOS_Computer_Name: KEVIN                                                                                                                                            
|   DNS_Domain_Name: kevin                                                                                                                                                  
|   DNS_Computer_Name: kevin                                                          
|   Product_Version: 6.1.7600                                                         
|_  System_Time: 2025-11-10T06:56:54+00:00                                            
| ssl-cert: Subject: commonName=kevin                                                 
| Issuer: commonName=kevin                                                            
| Public Key type: rsa                                                                
| Public Key bits: 2048                                                                                                                                                     
| Signature Algorithm: sha1WithRSAEncryption                                                                                                                                
| Not valid before: 2025-11-09T06:51:48                                                                                                                                     
| Not valid after:  2026-05-11T06:51:48                                                                                                                                     
| MD5:   f8ca:2645:3c64:cef1:1c8c:2fc6:30de:81d6                                                                                                                            
| SHA-1: 1192:49a2:11af:b68a:5d22:8615:efff:45fb:6723:b3bd                                                                                                                  
| -----BEGIN CERTIFICATE-----                                                                                                                                               
| MIICzjCCAbagAwIBAgIQI5zyqr9unpJN3uLb6MzbCzANBgkqhkiG9w0BAQUFADAQ
<snipped>
|_-----END CERTIFICATE-----
|_ssl-date: 2025-11-10T06:57:09+00:00; +1s from scanner time.
3573/tcp  open  tag-ups-1?   syn-ack ttl 125
49152/tcp open  msrpc        syn-ack ttl 125 Microsoft Windows RPC
49153/tcp open  msrpc        syn-ack ttl 125 Microsoft Windows RPC
49154/tcp open  msrpc        syn-ack ttl 125 Microsoft Windows RPC
49155/tcp open  msrpc        syn-ack ttl 125 Microsoft Windows RPC
49158/tcp open  msrpc        syn-ack ttl 125 Microsoft Windows RPC
49159/tcp open  msrpc        syn-ack ttl 125 Microsoft Windows RPC
Service Info: Host: KEVIN; OS: Windows; CPE: cpe:/o:microsoft:windows

<snipped>

HTTP (80):

Lets browse to that port:

With admin:admin, we can login successfully:

If we went to the help tab, we will find the exact version of the running service:

Exploitation:

Search for public exploits:

Lets try the python one:

Read the file:

The only thing we want to change here is the shellcode, to add our own IP address and local port:

Add that shellcode to the script:

Now lets start a netcat listener, then run the script with python2:

After waiting a minute:

Here we have a reverse shell as system.

Get the flag:

Last updated