Access

Summary

  • Only three ports open: FTP (21), Telnet (23), and HTTP (80) running Microsoft IIS 7.5.

  • Anonymous login to FTP revealed two files: a password-protected ZIP and a backup .mdb database.

  • Extracted valid user credentials from the .mdb file using an online viewer.

  • Used engineer creds to unlock the ZIP file, which contained a .pst email archive.

  • The PST file disclosed new credentials for the user security: 4Cc3ssC0ntr0ller.

  • Logged in via Telnet as security and enumerated stored credentials using cmdkey.

  • Escalated privileges using runas with saved credentials for Administrator.


Enumeration

sudo nmap -A -sC -sN -p- -T4 -oN full.nmap 10.10.10.98

Discovered:

  • FTP (21) → Anonymous login enabled.

  • Telnet (23) → Exposed NTLM and version info (Windows XP).

  • HTTP (80) → Default MegaCorp landing page (no obvious attack surface).


Initial Foothold

FTP Enumeration

Downloaded files:

  • Access Control.zip (password protected)

  • backup.mdb

Used mdbopener.comarrow-up-right to extract credentials:

Used engineer credentials to unlock ZIP file:

Unzipped archive revealed an Outlook PST file → Viewed using an online PST viewer:


Telnet Access

Successfully logged in!


Privilege Escalation

Step 1: Check Stored Credentials

Found saved credentials for:

  • ACCESS\Administrator


Step 2: Use runas to Pivot as Administrator

Used Netcat to get full shell:

Boom! SYSTEM shell obtained.

Last updated