Netmon
Machine Information
Netmon is an easy difficulty Windows box with simple enumeration and exploitation. PRTG is running, and an FTP server with anonymous access allows reading of PRTG Network Monitor configuration files. The version of PRTG is vulnerable to RCE which can be exploited to gain a SYSTEM shell.
Writeup
Enumeration
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
nmap -sCV 10.129.184.73
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 02-03-19 12:18AM 1024 .rnd
| 02-25-19 10:15PM <DIR> inetpub
| 07-16-16 09:18AM <DIR> PerfLogs
| 02-25-19 10:56PM <DIR> Program Files
| 02-03-19 12:28AM <DIR> Program Files (x86)
| 02-03-19 08:08AM <DIR> Users
|_11-10-23 10:20AM <DIR> Windows
| ftp-syst:
|_ SYST: Windows_NT
80/tcp open http Indy httpd 18.1.37.13946 (Paessler PRTG bandwidth monitor)
| http-title: Welcome | PRTG Network Monitor (NETMON)
|_Requested resource was /index.htm
|_http-server-header: PRTG/18.1.37.13946
|_http-trane-info: Problem with XML parsing of /evox/about
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
We can see Port 21 (FTP), and 80 (HTTP - PRTG Network Monitor) are opened.
User Flag
Login FTP with anonymous and no password.
We can get user’s flag at /Users/Public/user.txt
Root Flag
We will search for PRTG
location on Google, and we will get C:\ProgramData\Paessler\PRTG Network Monitor
Here we have 3 configuaration files, get them all and read thourgh.
We will see credential in plain text.
1
2
<!-- User: prtgadmin -->
PrTg@dmin2018
Access to port 80, look at the bottom of the website, we can see the version 18.1.37
, let search for its CVE.
After we have its CVE, let go to metaploit and search for cve, set up rhost, credential, lhost and then run, we can get the flag from the path Users/Administrator/Desktop/root.txt