Butler
Ennumeration
sudo netdiscover -r 10.0.2.0/24
10.0.2.80 08:00:27:59:23:51 1 60 PCS Systemtechnik GmbH nmap
nmap -T4 -p- -A 10.0.2.80
Starting Nmap 7.92 ( https://nmap.org ) at 2022-02-16 14:14 EST
Nmap scan report for 10.0.2.80
Host is up (0.00025s latency).
Not shown: 65523 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
5040/tcp open unknown
7680/tcp open pando-pub?
8080/tcp open http Jetty 9.4.41.v20210516
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: Site doesn't have a title (text/html;charset=utf-8).
|_http-server-header: Jetty(9.4.41.v20210516)
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49668/tcp open msrpc Microsoft Windows RPC
49669/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 3.1.1:
|_ Message signing enabled but not required
|_nbstat: NetBIOS name: BUTLER, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:59:23:51 (Oracle VirtualBox virtual NIC)
| smb2-time:
| date: 2022-02-17T03:18:23
|_ start_date: N/A
|_clock-skew: 7h59m58s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 267.15 secondsJenkins
Password spraying with Cluster bomb inside Burp Suite
Found
user: Jenkins pass: Jenkins
Manage Jenkins -> Scrip console
Search on google for groovy remote shell
Attacker machine
Jenkins Console
Result
Privilege escalation
Download the X64 version for windows
Can use the python3 -m http.server 80 to create a socket and connection or download directly inside the machine
The juicy part of the output

With that, we can put an executable in this path, and it will treat as part of the service
Generate reverse shell with msfvenom
Download and execute malware
On attacker machine, open another shell
On vulnerable machine
Last updated