Blue- HTB Walkthrough

dl padmavathi
2 min readFeb 26, 2020

The IP address of the machine is: 10.10.10.40

Nmap:

Nmap shows that smb server is installed on the host and on port 445 service is running. The name of the box “blue” suggests that it must be eternal blue vulnerability and also I have searched google with service running on port 445 which gives below exploit.

So I have opened Metasploit and searched for the exploit, whether I can use the direct exploit.

I have used windows 7 exploit of eternal blue because in nmap it gave windows 7 version.

Observe we got the shell session.

Now we will check the privileges and try to access the hashes.

Observe we got system privileges, no need to privilege escalation here.

And also we can do below to post exploitation steps to create a new user and make a rdp connection if the shell is not stable.

As seen in the above screenshot we can see newuser is being used to login using rdesktop.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

dl padmavathi
dl padmavathi

Written by dl padmavathi

I go by Padma. I am a security enthusiast. This blog contains security related and some general stuff. E-mail:pduggire@gmu.edu

No responses yet

Write a response