Brian
Brian
Introduction:
The Algeron Windows Box is an easy-level machine that is designed to test
your skills in penetration testing and privilege escalation. It is a great
machine for beginners who want to learn more about offensive security and
gain experience solving real-world security challenges. In this walkthrough,
I will guide you through the steps that I took to solve the Algeron Windows
Box.
Getting Started:
The first step was to scan all TCP ports on the target machine using
Rustscan. The scan revealed several open ports, including FTP, HTTP,
MSRPC, NetBIOS-SSN, and Microsoft DS.
The scan revealed that the FTP server permitted anonymous login, but the
directory listing was unavailable due to a timeout. The HTTP server was
running Microsoft IIS 10.0.
Searchsploit Search
Exploitation:
We download the CVE 2019–7214 script to a Python file called exploit.py on
our Kali machine (changing the IP addresses as needed).
Conclusion:
In conclusion, we were able to successfully locate and exploit a vulnerability
in SmarterMail server and gain a netcat session as NT Authority System. This
was a great opportunity to practice reconnaissance, scanning, and
exploitation techniques.
1 Follower
I'm a cybersecurity enthusiast with a passion for ethical hacking and penetration testing.
Currently, I'm studying for my OSCP.
Brian Brian
2
Brian Brian
Lists
50 2 1
154 3