✉️Lookback (Windows)

You’ve been asked to run a vulnerability test on a production environment.

Enumeración de Red

Scan general y específico de servicios
sudo nmap --min-rate 5000 -sS -p- --open -n -Pn 10.10.66.160 -oN puertos
nmap -sCV -p 10.10.66.160 -oN nmap

Resultado nmap

PORT     STATE SERVICE       VERSION
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Site doesn't have a title.
443/tcp  open  ssl/https
| ssl-cert: Subject: commonName=WIN-12OUO7A66M7
| Subject Alternative Name: DNS:WIN-12OUO7A66M7, DNS:WIN-12OUO7A66M7.thm.local
| Not valid before: 2023-01-25T21:34:02
|_Not valid after:  2028-01-25T21:34:02
| http-title: Outlook
|_Requested resource was <https://10.10.66.160/owa/auth/logon.aspx?url=https%3a%2f%2f10.10.66.160%2fowa%2f&reason=0>
|_http-server-header: Microsoft-IIS/10.0
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=WIN-12OUO7A66M7.thm.local
| Not valid before: 2025-07-30T08:11:33
|_Not valid after:  2026-01-29T08:11:33
| rdp-ntlm-info: 
|   Target_Name: THM
|   NetBIOS_Domain_Name: THM
|   NetBIOS_Computer_Name: WIN-12OUO7A66M7
|   DNS_Domain_Name: thm.local
|   DNS_Computer_Name: WIN-12OUO7A66M7.thm.local
|   DNS_Tree_Name: thm.local
|   Product_Version: 10.0.17763
|_  System_Time: 2025-07-31T08:22:14+00:00
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Enumeración de Servicio Web

Ffuf

  • /ecp → Microsoft ECP (Exchange Admin Center)

  • /testHTTP Basic Auth

Weak Credentials: admin:admin → Auth Bypass

Enumeración Post-Autenticación

Explotación: Command Injection

Código Vulnerable

Payload

PoC

  • thm\admin

Explotación

Intrusión en el Sistema

PowerShell: thm\admin

Enumeración Post-Intrusión

C:\users\dev\desktop\todo.txt

Hey dev team,

This is the tasks list for the deadline:

Promote Server to Domain Controller [DONE] Setup Microsoft Exchange [DONE] Setup IIS [DONE] Remove the log analyzer[TO BE DONE] Add all the users from the infra department [TO BE DONE] Install the Security Update for MS Exchange [TO BE DONE] Setup LAPS [TO BE DONE]

When you are done with the tasks please send an email to: [email protected] [email protected] and do not forget to put in CC the infra team! [email protected]

  • Local users: administrator, dev

Enumeración de MS Exchange Server

  • Build: 15.2.858.5

  • Exchange Server 2019 CU9 - March 16, 2021 - 15.2.858.5

> exploit/windows/http/exchange_proxyshell_rce

Explotación: CVE-2021-34473 (Microsoft Exchange ProxyShell RCE)

Exploitation Error

Compromiso del Sistema

Shell: NT AUTHORITY\SYSTEM

Última actualización