Netmon (w/o Meterpreter)
IP: 10.10.10.152
Recon
nmap -T4 -A -p- 10.10.10.152
21 open ftp Microsoft FTP
ftp-anom: Anonymous FTP login allowed
Looks like it lists C:\ files
80 open http Indy httpd 18.1.37.13946 (Paessler PRTF bandwidth monitor)
135 open msrpc Windows RPC
139 open netbios-ssn Windows netbios-ssn
445 open microsoft-ds Windows Server 2008 R2 - 2012 microsoft-ds
5985 open http HTTPAPI httpd 2.0 (SSDP/UPnP)
47001 open http HTTPAPI httpd 2.0 (SSDP/UPnP)
Other RPC open ports 49664,49665,49666,49667,49668,49669
Enumeration
We can use FTP port 21 to enumerator C:\ and find user flag.
Routing to port 80 server, we get prompt to login on index.htm
. Lets google PRTG Network Monitor for default credentials. We find default credentials are prtgadmin
. (Heads up! It doesn't work)
At bottom of page we find that its running PRTG Network Monitor 18.1.37.13946
.
Lets anonm log into FTP and search for the path \AllUsersProfile\Application data\Paessler\PRTG Network Monitor\
Nice! We got the database files, lets grep each file for admin user prtgadmin
to see if password is hard-coded.
Aha! We found the password PrTg@dmin2018
hard-coded under the old backup database file.
But trying the following credentials on the admin page doesn't work... prtgadmin:PrTg@dmin2018
. Changing 2018 to 2019 works... of course it does. Shows how strong password policies are.
Lets copy bash script and create a h4ck3r_script.sh
and copy the content. (Put a new line before #!/bin/bash , if you have issues script not declaring as bash). Make sure to allow execute, chmod +x h4ck3r_script.sh
. Now lets run the script.
The script created a user pentest
with password of P3nT3st!
.
Run the following command:
You could also use wmiexec.py or smbexec.py but get more functionality from psexec.py. Benefit of using these tools instead of meterpreter shell (besides use in OSCP) is that meterpreter can easily be picked up by anti-virus.
Last updated
Was this helpful?