# Algernon

## nmap

```
mkdir nmap
sudo rustscan -a 192.168.96.65 --ulimit 5000 -- -T4 -A -oA nmap/all-ports-service-scan
```

A web server is open on port 9998, also an interesting service is on port 17001.

<div align="left"><img src="https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJXNSLl8CFYStdNMAQ%2F-MkJXlfwPL3KrUTn7ib7%2Fimage.png?alt=media&#x26;token=ec6531c0-a458-4616-a9ca-371a8e8187bd" alt=""></div>

When I open my browser, the website redirects to a log-in page.

![](https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJXNSLl8CFYStdNMAQ%2F-MkJYVSP_OBsspNFZLwA%2Fimage.png?alt=media\&token=84218a5e-b39b-466f-9659-cbf10996e83d)

## Exploitation

The website is running `SmarterMail` and looks like there's a Remote Code Execution vulnerability we can try.

<div align="left"><img src="https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJYZq4vTWi_RG_SAo2%2F-MkJZ3Lm0poA5xbXRVc6%2Fimage.png?alt=media&#x26;token=6595c6b1-aeb2-4d22-9530-429455025b9d" alt=""></div>

Let's mirror this exploit to our local machine.

<div align="left"><img src="https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJYZq4vTWi_RG_SAo2%2F-MkJZPuNjy8pf4RAy4LY%2Fimage.png?alt=media&#x26;token=713e12e7-d81d-4436-8f6e-3e97998e7a7a" alt=""></div>

Edit the script, then set the `HOST` variable with the target IP address, set `LHOST` with your local machine IP address, and set `LPORT` to 80

<div align="left"><img src="https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJYZq4vTWi_RG_SAo2%2F-MkJZysRulvNUcLmvu36%2Fimage.png?alt=media&#x26;token=763f8683-22c5-49da-b59c-5f21eda9c5f4" alt=""></div>

Setup a reverse shell listener on port 80

<div align="left"><img src="https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJYZq4vTWi_RG_SAo2%2F-MkJ_FJzvZxagSO1ljhb%2Fimage.png?alt=media&#x26;token=7984c5ce-8b59-437d-b67a-7c7f95fc4bcd" alt=""></div>

Execute the following to run the script, `python3 49216.py` and you should received a shell with `nt authority\system` privilege

<div align="left"><img src="https://3211174753-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhuCb52HTt9nZusE7xn%2F-MkJYZq4vTWi_RG_SAo2%2F-MkJ_gWwgJXISgu4AX2v%2Fimage.png?alt=media&#x26;token=a0f5aa20-6d62-4b45-ac9d-4707eced932c" alt=""></div>
