Writeup by wook413

Recon

Nmap

As always, I started the engagement with a comprehensive Nmap scan of all 65,535 TCP ports, followed by a targeted service scan and a UDP scan of the top 10 ports.

Initial Access

After reviewing the Nmap results, I analyzed the open ports to identify potential attack vectors.

remoting (.NET Remoting Services) 17001

I identified .NET Remoting Services running on port 17001. A searchsploit query revealed a known RCE vulnerability. Since the target was confirmed as a Windows machine, this remained a viable backup option.

HTTP 9998

Upon further inspection of the HTTP service on port 9998, I discovered it was hosting SmarterMail. Searching for “SmarterMail exploit” led me to an exploit script that looked very promising for achieving initial access.

image-20260128233240628

image-20260128233252676

I downloaded the exploit and updated the LHOST and LPORT settings.

image-20260128233300353

However, when executing the script, I encountered the following error:

The error U+200B indicated a Zero Width Space character, likely introduced during the copy-paste process from the web. To fix this, I opened the script in vim and used the :set list command to reveal hidden characters. After stripping out the non-printable characters, the script was ready for execution.

image-20260128233307739

Shell as system

I executed the cleaned exploit and successfully received a reverse shell. To my surprise, the exploit provided immediate SYSTEM level privileges.

Found proof.txt