windowsMice

Enumeration:

Port Scanning:

┌──(kali㉿kali)-[~/…/Machines/OffsecPG/Practice/Mice]
└─$ sudo nmap -sCV -p- --min-rate 4000 -oA nmap/services -vv 192.168.182.199
Starting Nmap 7.95 ( https://nmap.org ) at 2025-11-10 13:19 EST
Nmap scan report for 192.168.182.199                                                                                                                                        
Host is up, received echo-reply ttl 125 (0.13s latency).                                                                                                                    
Scanned at 2025-11-10 13:19:45 EST for 242s                                                                                                                                 
Not shown: 65530 filtered tcp ports (no-response)                                                                                                                           
PORT     STATE SERVICE        REASON          VERSION
1978/tcp open  remotemouse    syn-ack ttl 125 Emote Remote Mouse
1979/tcp open  unisql-java?   syn-ack ttl 125
1980/tcp open  pearldoc-xact? syn-ack ttl 125
3389/tcp open  ms-wbt-server  syn-ack ttl 125 Microsoft Terminal Services
|_ssl-date: 2025-11-10T18:23:48+00:00; +2s from scanner time.
| ssl-cert: Subject: commonName=Remote-PC
| Issuer: commonName=Remote-PC
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-08-25T10:09:25
| Not valid after:  2026-02-24T10:09:25
| MD5:   ee3d:e4de:8e91:a5b4:7115:34cb:986a:f8bd
| SHA-1: 093c:db26:68db:b772:9089:ad5a:833b:90f8:d929:4eb7
| -----BEGIN CERTIFICATE-----
| MIIC1jCCAb6gAwIBAgIQdK7WCoPG665IL5mbwZdubTANBgkqhkiG9w0BAQsFADAU
<snipped>
|_-----END CERTIFICATE-----
| rdp-ntlm-info: 
|   Target_Name: REMOTE-PC
|   NetBIOS_Domain_Name: REMOTE-PC
|   NetBIOS_Computer_Name: REMOTE-PC
|   DNS_Domain_Name: Remote-PC
|   DNS_Computer_Name: Remote-PC
|   Product_Version: 10.0.19041
|_  System_Time: 2025-11-10T18:23:19+00:00
7680/tcp open  pando-pub?     syn-ack ttl 125
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

<snipped>

We have 3 wierd open ports, and rdp on port 3389.

Lets try and connect to one of the first three open ports:

I searched for that on google, and found this:

Also the same service name is shown in the nmap result.

We do not the exact version but we will pull this exploit and try it out:

I will just edit the cmd to run on the target.

First test on what ports the target can reach to us:

Exploitaion:

Lets upload netcat then get a reverse shell:

Rerun the script again.

Now lets get a reverse shell:

Post-Exploitation:

Doing some local enumeration, we will find filezilla ftp installed on that target:

Filezilla ftp has a file contains credentials for several purposes, I searched online for the path of that file:

We can find under our current user\appdata\roamin\filezilla:

In recentservers:

I will copy the base64 encoded password, decode it, validate if it it still valid, then authenticate via xfreerdp3 if yes:

It is valid.

Again based on our previous search, I found that we can exploit remote mouse for privilege escalation:

We will follow these steps.

First if you can not view the icons under the system tray, just open task manager, and restart windows explorer.

First we will right-click on remote mouse, the preferences:

Go to settings:

Click on change above.

Now in the windows address bar paste cmd.exe:

Here we elevated our privileges to system.

Get the flags:

Last updated