Butler

Ennumeration

sudo netdiscover -r 10.0.2.0/24

 10.0.2.80       08:00:27:59:23:51      1      60  PCS Systemtechnik GmbH                                                                                  
  • nmap

nmap -T4 -p- -A 10.0.2.80      

Starting Nmap 7.92 ( https://nmap.org ) at 2022-02-16 14:14 EST
Nmap scan report for 10.0.2.80
Host is up (0.00025s latency).
Not shown: 65523 closed tcp ports (conn-refused)
PORT      STATE SERVICE       VERSION
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds?
5040/tcp  open  unknown
7680/tcp  open  pando-pub?
8080/tcp  open  http          Jetty 9.4.41.v20210516
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Site doesn't have a title (text/html;charset=utf-8).
|_http-server-header: Jetty(9.4.41.v20210516)
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled but not required
|_nbstat: NetBIOS name: BUTLER, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:59:23:51 (Oracle VirtualBox virtual NIC)
| smb2-time: 
|   date: 2022-02-17T03:18:23
|_  start_date: N/A
|_clock-skew: 7h59m58s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 267.15 seconds

Jenkins

http://10.0.2.80:8080/

  • Password spraying with Cluster bomb inside Burp Suite

Found

user: Jenkins pass: Jenkins

Manage Jenkins -> Scrip console

Search on google for groovy remote shell

  • Attacker machine

  • Jenkins Console

  • Result

Privilege escalation

PEASS-ng

Download the X64 version for windows

Can use the python3 -m http.server 80 to create a socket and connection or download directly inside the machine

  • The juicy part of the output

With that, we can put an executable in this path, and it will treat as part of the service

  • Generate reverse shell with msfvenom

  • Download and execute malware

On attacker machine, open another shell

On vulnerable machine

Last updated