Scanning and Enumeration
Scanning
kali@kali:~/HTB/Optimum$ nmap -sC -sV -p 80 10.10.10.8 -oN optimum
Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-20 19:14 EST
Nmap scan report for 10.10.10.8
Host is up (0.080s latency).
PORT STATE SERVICE VERSION
80/tcp open http HttpFileServer httpd 2.3
|_http-server-header: HFS 2.3
|_http-title: HFS /
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.53 seconds
Enumeration
Researching this vulnerability we are going to have to do the following:
Configure exploit to connect to a port on our attack machine
Set up an httpserver with nc.exe running
set up our listening
Run the python code
This exploit will grab the nc.exe from our server (port 80) execute it and run it and connect it to our attack machine. Further research of the exploit can be found here:
Last updated
Was this helpful?