Netmon - Easy

OSCP Prep Box

Netmon

Introduction@Netmon:~$

IP

10.10.10.152

Os

Window

Points

20

Difficulty

Easy

Release Date

02 March 2019

Enumeration

Nmap

FTP can login with Anonymous

It seem like ftp root directory is c:\

Getting User.txt

We can easily get user flag with ftp anonymous.

Web

It PRTG Network Monitor (NETMON) page and we should try default credential which is prtgadmin:prtgadmin . But it doesn't work in here. We need to search the credential in FTP login.

After poke around, found PRTG Network Configuration File in this location \ProgramData\Paessler\PRTG Network Monitor.

Let's try with this credentials in Login Page.

But it doesn't work, if we look again password structure PrTg@dmin2018 .It end with 2018 and the configuration file is also a backup file. So we should change that year in password. I tried it with PrTg@dmin2019 and It was worked.

Geting Administrator

We can see version of that page on the left bottom and now we should try to search exploit for that.

We will use this exploitdbarrow-up-right bash script.

https://www.exploit-db.com/exploits/46527arrow-up-right

If we execute this bash script, you may get error like this

Run the following command to fix that error.

sed -i -e 's/\r$//' 46527.sh

We need to get cookie using burp to run this script.

Now we created a new user with this credential pentest:P3nT3st! Login with psexec.py

https://app.hackthebox.com/profile/237587arrow-up-right

Resources

https://www.exploit-db.com/exploits/46527arrow-up-right

https://www.codewatch.org/blog/?p=453arrow-up-right

Last updated