Retired Machine (Optimum)
User File Flag
Running an Nmap scan yields a hosted fileserver.
Going to the webpage shows that it uses an HFS service for hosting. Doing a Nikto scan shows us that it uses HFS 2.3 version. In Metasploit we can do a simple search for this:
Using the "regetto_hfs_execution" exploit we just need to edit the 'Rhost' to point to our vulnerable fileserver.
A successful exploit will award us with a 'Meterpreter' session.
After getting our sessions started we can run a 'ls' command to list out what is currently in the directory. We find the file 'user.txt.txt' completing our 'User flag' portion:
Next we will continue with this machine and do our Privilege escalation exploit. I will talk about the importance of having the 'Meterpreter' session (with payloads) in a x64 process rather than a x32 process.