
System Shell Overviewīoth of these vulnerabilities give a shell as system.

It looks like this box is vulnerable to two infamous SMB exploits, MS-08-067 (made famous by Conficker) and MS-17-010 (made famous by Shadow Brokers). Nmap done: 1 IP address (1 host up) scanned in 5.49 seconds
#XC2 GLOOMWOOD ROOT CODE#
| A critical remote code execution vulnerability exists in Microsoft SMBv1 | Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010) |_smb-vuln-ms10-061: ERROR: Script execution failed (use -d to debug) | code via a crafted RPC request that triggers the overflow during path canonicalization.

| Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary | The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, | Microsoft Windows system vulnerable to remote code execution (MS08-067) Neither smbmap nor smbclient show any ability to log in without nmap -script smb-vuln* -p 445 -oA nmap/smb_vulns 10.10.10.4 Nmap done: 1 IP address (1 host up) scanned in 257.42 seconds |_smb2-time: Protocol negotiation failed (SMB2)

|_ message_signing: disabled (dangerous, but default) | OS: Windows XP (Windows 2000 LAN Manager) |_nbstat: NetBIOS name: LEGACY, NetBIOS user:, NetBIOS MAC: 00:50:56:b2:7b:09 (VMware) Service Info: OSs: Windows, Windows XP CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp Nmap done: 1 IP address (1 host up) scanned in 13.46 nmap -sC -sV -p 139,445 -oA nmap/scripts 10.10.10.4ġ39/tcp open netbios-ssn Microsoft Windows netbios-ssnĤ45/tcp open microsoft-ds Windows XP microsoft-ds Nmap done: 1 IP address (1 host up) scanned in 13.43 nmap -sU -p-min-rate 10000 -oA nmap/alludp 10.10.10.4
