Hi Hackers Welcome Back, Today we are going to look at Hack The Box Explosion Machine.
Info Table
Room Name | Explosion |
---|---|
Category | Hack The Box |
OS | Linux |
Difficulty | Very Easy |
Maker | Hack The Box |
Kill Chain Summery
While enumerating ports and services we can able to find the port 3389 ware open. while trying to connect with default or well known usernames. RDP ware get logged in with default security credentials.
Recon
Letβs start with nmap Default scan ( -sC ) resulting port 3389 RDP port has opened and the target is windows 2 platform operating system
|
|
Remote access software represents a legitimate way to connect to other hosts to perform actions or offer support. The interactions involved by using any type of remote access tool can either be CLI-based Command Line Interface) or GUI-based (Graphical User Interface). These tools use the same protocol at their base to communicate with the other hosts, which is RDP . RDP (Remote Desktop Protocol) operates on ports 3389 TCP and 3389 UDP . The only difference consists of how the information relayed by this protocol is presented to the end-user.
CLI - Remote Access Tools
Command Line Interface-based Remote Access Tools have been around forever. A rudimentary example of this is Telnet
, which was explored briefly in the Meow
machine. In its most basic configuration, Telnet is considered insecure due to lacking the ability to encrypt the data being sent through it securely. This implies that an attacker with access to a network TAP (Traffic Access Point) could easily intercept the packets being sent through a Telnet connection and read the contents, be they login credentials, sensitive files, or anything else. Telnet, which runs on port 23 TCP by default, has mainly been replaced by its more secure counterpart, SSH , running on port 22 TCP by default.
SSH
, which stands for Secure Shell Protocol, adds the required layers of authentication and encryption to the communication model, making it a much more viable approach to perform remote access and remote
file transfers. It is used both for patch delivery, file transfers, log transfer, and remote management in today’s environment.
However, both Telnet and SSH only offer the end-user access to the remote terminal part of the host being reached. This means that no display projection comes with these tools. In order to be able to see the remote host’s display, one can resort to CLI-based tools such as xfreerdp
. Tools such as this one are called Remote Desktop Tools
, despite being part of the Remote Access family.
The reasoning behind this is because the whole desktop can be remotely controlled by the user initiating the connection, like one would if they were physically in the room with the remote host, using its keyboard, mouse, and display to interact with it, including the ability to view graphical content, controlling the mouse pointer and keyboard input, easily interacting with the web browser, and more.
We can quickly check for any misconfigurations in access control by attempting to connect to this readily available port without any valid credentials, thus confirming whether the service allows guest or anonymous connections or not.
we will be using xfreerdp to connect from our Parrot Security virtual machine. to target machine. If you need to install xfreerdp, you can proceed with the following command: sudo apt-get install freerdp2-x11
|
|
/v:{target_IP} :
Specifies the target IP of the host we would like to connect to.
/cert:ignore :
Specifies to the scrips that all security certificate usage should be ignored.
/u:Administrator :
Specifies the login username to be “Administrator”.
/v:{target_IP} :
Specifies the target IP of the host we would like to connect to.
Login with common user names and default password after many tries. we got RDP desktop using user name as Administrator with empty password.
|
|