[HackTheBox] Blue

Siddharth Johri
2 min readOct 7, 2021

--

This is one of the easiest boxes out there. Almost no enumeration is required and we get direct root.

Initial Scan:

EternalBlue
Direct root with metasploit.

But I am preparing for OSCP so I was looking for a manual method too. I came across this but it wasn't working at all somehow. Then I switched tools and went over to this.

This also did not work right out of the box so I was looking for people manually doing the exploit on YouTube.

After watching a few videos, I figured out that I needed a name pipe which had open permissions, in this box there were none for unauthenticated users, but “guest”:”” was technically authenticated so I tried the exploit with these credentials.

Okay so “guest”:”” will give us results.

Made a stage-less reverse tcp shell “root.exe” with msfvenom and used send_and_execute.py to get a reverse shell.

The reverse shell that spawned has system permissions so basically the box is Pwned!!!

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Siddharth Johri
Siddharth Johri

Written by Siddharth Johri

To hack the world, first you need to make coffee

No responses yet

Write a response