Writeup by wook413

Enumeration

Nmap

I started with a comprehensive TCP scan of all 65,535 ports.

Once the open ports were identified, I followed up with a targeted service scan to pinpoint specific versions.

I also performed a UDP scan on the top 10 ports to check for any overlooked common services.

Initial Access

SMB 139 445

Spotting SMB, I ran serveral Nmap scripts, specifically smb-enum-shares ,smb-enum-users , and vuln . However, they didn’t yield any leads.

I attempted Null Authentication, but the server blocked the attempt.

RPC 135

Similarly, Null Authentication via rpcclient was also restricted.

HTTP 80

Moving to the web services, I ran http-enum on the two active HTTP ports: 80 and 8082. They didn’t return anything noteworthy.

image-20260129001047828

HTTP 8082

Upon navigating to port 8082, I found a login interface for an H2 Database console. Most of the connection details were already auto populated, leaving only the password field empty.

image-20260129001054291

I simply clicked “Connect” and gained access to the console, which identified the version as H2 1.4.199

image-20260129001100628

A quick search on Searchsploit for that specific version turned up a relevant exploit.

After verifying the exploit’s functionality, I successfully executed a command that identified the current user as jacko\\tony

image-20260129001109573

To establish a more stable connection, I transferred nc.exe to the C:\\Users\\Public directory.

image-20260129001115559

image-20260129001119983

Shell as tony

I successfully triggered a reverse shell; note that while the whoami command initially failed, it worked perfectly once I called its absolute path.

Found local.txt

Privilege Escalation

Current user tony has SeImpersonatePrivilege enabled.

Transferred GodPotato binary over to the target machine.

I had GodPotato binary connect to my reverse shell.

Shell as system

Successfully got the connection.

Found proof.txt