HackPark
Room Link: https://tryhackme.com/room/hackpark
Using Hydra to brute-force a login
What request type is the Windows website login form using?

Crafting request for Hydra
Sent a failed login request to Burp to see what it would look like. With this info I was able to craft my request for hydra. I just needed to get the URL and everything that is sent after VIEWSTATE and just change the input to use ^USER^ and ^PASS^ to brute force these fields.

I could also do this without burp by just opening the console and getting the info from there


Compromise the machine
Now you have logged into the website, are you able to identify the version of the BlogEngine?

What is the CVE?
CVE-2019-6714
Exploit Link: https://www.exploit-db.com/exploits/46353
Using the public exploit, gain initial access to the server. Who is the webserver running as?
Created the file mentioned in the exploit, just changed the IP to my IP.

Setup a nc listener
Upload the file


Navigate to the link and the nc listener should have caught it


Windows Privilege Escalation
Setting up meterpreter shell
Kali #1
Kali #2
Victim
What is the OS version of this windows machine?

Further enumerate the machine. What is the name of the abnormal service running?
Check Windows Exploit Suggester
Kali
Transfer WinPeas
Kali
Victim


We can see Message.exe is kept being ran by Administrator so we just need to replace the file with our reverse shell, setup a listener and wait for the Administrator to try to run it.

Kali
Victim


Last updated