Netmon - Easy

OSCP Prep Box

Netmon

Introduction@Netmon:~$

Name

IP

10.10.10.152

Os

Window

Points

20

Difficulty

Easy

Creator

Release Date

02 March 2019

Enumeration

Nmap

FTP can login with Anonymous

It seem like ftp root directory is c:\

Getting User.txt

We can easily get user flag with ftp anonymous.

Web

It PRTG Network Monitor (NETMON) page and we should try default credential which is prtgadmin:prtgadmin . But it doesn't work in here. We need to search the credential in FTP login.

After poke around, found PRTG Network Configuration File in this location \ProgramData\Paessler\PRTG Network Monitor.

Let's try with this credentials in Login Page.

But it doesn't work, if we look again password structure PrTg@dmin2018 .It end with 2018 and the configuration file is also a backup file. So we should change that year in password. I tried it with PrTg@dmin2019 and It was worked.

Geting Administrator

We can see version of that page on the left bottom and now we should try to search exploit for that.

We will use this exploitdb bash script.

https://www.exploit-db.com/exploits/46527

If we execute this bash script, you may get error like this

Run the following command to fix that error.

sed -i -e 's/\r$//' 46527.sh

We need to get cookie using burp to run this script.

Now we created a new user with this credential pentest:P3nT3st! Login with psexec.py

https://app.hackthebox.com/profile/237587

Resources

https://www.exploit-db.com/exploits/46527

https://www.codewatch.org/blog/?p=453

Last updated