Axxle

Recon

nmap_scan.log

On http webapp we see accounts@axlle.htb email, add it to /etc/hosts

DNS (53)

SMB

We are not able to enumerate the smb via null or default usernames.

HTTP (80)

Writeup.png

Backend is IIS webserver.

Writeup-1.png

Excel

Reading:

It looks like we can only send Excel documents but they may not contain macros.

Writeup-2.png

I was first using https://github.com/0xflagplz/Xll-Payload-Generatorarrow-up-right tool to generate

Testing stage:

The testing stage worked, yay! Then I experimented on connection and it worked!

But when I was sending the email to the user I was getting nothing back!

After some trial and error other tool was suggested to use https://github.com/moohax/xllpocarrow-up-right. Clone the project, download shit ton of c++ stuff, with sdk, edit XLL_POC.cpp

The project generates XLL_POC.dll which you should rename to XLL_POC.xll, since xll files are essentially dll files...

Reverse Shell (gideon.hamill)

Upgrade shell with ConPtyShell for more stability and run winpeas to enumerate the system.

winpeas showed useful information for us to explore. First I visited hMailServer. Password may come in handy for something?

Command to list the shares:

Couldn't get passwor via dpapi cache

Enumerate groups:

We are parts of Accounts and Employees group, accounts seems to be Managers.

List connections and process names:

Still nothing eye catching....

Privilege Escalation (dallon.matrix)

OSINT Testing

Okay, finally I decided to view where the xll were stored and surprise surprise!

Save usernames for later just in case.

Create the file

Meanwhile start responder:

User.txt

Well hash couldn't be cracked with rockyou. Turns out you can also open files with file:// protocol, so let's get a reverse shell:

Privilege Escalation (jacob.greeny)

The user is part of Web Devs which means we should have access to some development features.

Access to C:\App Development is still denied to us.

Checking the powershell history reveals the password of user:

Creds: dallon.matrix:PJsO1du$CVJ#D

Since we got credentials we can harvest information about DC with bloodhound

Refer to: [[Bloodhound]]

Writeup-3.png

Show all groups permissions: Select Group -> First Degree Object Control

Writeup-5.png

Looks like we can reset password of 2 users. jacob.greeny and baz.humphries

TheHackerRecipies: ForceChangePasswordarrow-up-right Docs: https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainUserPassword/arrow-up-right Scripts https://github.com/PowerShellMafia/PowerSploitarrow-up-right

We are part of App Devs and finally have access to C:\App Development:

We have a README.md so let's check what project does:

Zip the directory and download:

The source has nothing interesting, but the comment which developer left is. automated task = cronjob!

It looks like we have 777 permission on the directory where binary lives, so since its a cronjob we can replace it with reverse shell and get system.

Privilege Escalation (Administrator)

So for whatever reason the msfvenom payload was not triggering, so I just decided to use Golang reverse shell.

Refer to [[Golang Reverse Shell]]

Root.txt

Last updated