THM: AllSignsPoint2Pwnage


A room that contains a rushed Windows based Digital Sign system. Can you breach it?


Enumeration

Let’s start with Rustscan to find for the open ports.

Start a nmap scan to dig into the open ports and add the necessary flags for in depth enumeration.

Directory/Files Enumeration on HTTP

/Port 80

FTP Anonymous Enumeration

SMB Null Enumeration

After running Nmap, I found that port 80 was open. I checked the website and saw it was displaying images. I then looked at the FTP service and found anonymous access with a file called notice.txt, which said images could be uploaded through a file share. Next, I checked the SMB shares and found one with read and write access, as well as another called installs that I couldn’t access.


Foothold

I went back to the website’s images directory and uploaded a PHP reverse shell via FTP, which gave me access to the machine.


Privilege Escalation

Once inside, I noticed I had SeImpersonate privileges. Using the PrintSpoofer exploit, I was able to escalate my privileges and gain administrator access.

Alternative

Another alternative is to check the installs file share, the administrator credentials are found in a .bat file.