CyberWriteups

Try Hack Me: Windows Privesc Complete Write-up

I’m not going to lie to you, sometimes I feel like the Try Hack Me labs are poorly written. Not in the way that I can’t understand anything, but to the point where I feel like the author of the lab assumed that every student doing the lab will be on their level. That’s where write-ups and walk-through videos make things easier. It helps beginners like me understand the fundamentals, and navigate my way through my hacker journey without getting frustrated, or giving up.

Today I thought to write my own write-up on a lab that I found pretty challenging: Windows PrivEsc on the Jr Penetration Tester learning path. Let’s get started! 😊

I will be skipping over the following tasks since it is read-only to complete:

  • Task 1: Introduction
  • Task 3: Tools of the trade
  • Task 7: Token Impersonation
  • Task 8: Quick Wins

Task 3: Information Gathering

To read the instructions/general information for this section please go to the task dedicated to it. I will not be copying and pasting all the information since it will make the write-up bloated and honestly, if you’re following along, it’s unnecessary to repeat what you’ve already read! 😁

Launch the target machine.
We will need to use Attackbox for this, or our own Windows Machine. For this writeup, I will be working on Attackbox.
Windows Privesc
Windows Privesc

List users on the target system. One of them resembles a flag.
Open up your cmd on your Windows machine and enter in the net users command. We can see the flag clear as day!
Windows Privesc
Windows Privesc

What is the OS version of the target machine?
In your cmd enter the systeminfo. You will find the OS version next to OS Version. 👀
Windows Privesc
Windows Privesc

When was security update KB4562562 installed?
You can use thewmic qfe get Caption,Description,HotFixID,InstalledOn command in cmd, but an easier method to find the date for this is to open up PowerShell on your Windows Machine and enter the Get-Hotfix command.
Windows Privesc
Windows Privesc

What is the state of Windows Defender?
Go back into your normal cmd and enter the sc query windefend command. (This answer was in the sections’ tutorial)
Windows Privesc
Windows Privesc


Task 4: Information Gathering

What version of a Fitbit application can you see installed?
Go into your cmd and enter the following command wmic product where "Vendor like %Fitbit%'" get name,version.
Windows Privesc

You can also just go into your add/remove programs on your Windows Machine to reveal the same information.
Windows Privesc
Windows Privesc

What kind of vulnerability seems to affect the Fitbit application?
This requires us to google a little bit. With a quick search on Exploit-DB we can see that it is affected by a Unquoted Service Path vulnerability.
Windows Privesc
Windows Privesc
Windows Privesc

What version of FoxitReader is installed on the target system?
If we try to use the wmic get product name,version command we can see that it does not return the FoxitReader service.
Windows Privesc

We will need to do something different. Go back to your cmd and enter the wmic service list brief command. You will see it listed below without it’s version.
Windows Privesc
Windows Privesc

We know it’s on the system, so we can go find it in our Program Files (x86) and read its properties to see which product version it’s running.
Windows Privesc
Windows Privesc


Task 5: DLL Hijacking

I’m going to be honest with you, this was way too much effort for the result received. If you want a detailed walk-through on this, let me know, but for now, I’m just going to go ahead and give you the answers. 😊

You can do this easily by just following the steps above and by making use of the hints provided. (The video that helped me with this task can be found here).

Login with Jack’s account (the new password you have set). What is the content of the flagdll.txt file?
Windows Privesc


Task 6: Unquoted Service Path

What is the full unquoted path of unquotedsvc
Open up your cmd and enter the sc qc unquotedsvc command to find the full unquoted path of unquotedsvs.
Windows Privesc
Windows Privesc

Go through subfolders in the unquotedsvc binary path. Which folder does the user have read and write privileges on? (Please write the whole path)
Go to the C:\Program Files\Unquoted Path Service\ directory and read the properties of the folder. Stop before you go into Common Files.
Windows Privesc
Windows Privesc

What would be the name of the executable you would place in that folder?
We can assume since it has a folder Common Files, the executable will be common.exe.

Windows Privesc
Windows Privesc

Obtain Administrator privileges on the target machine. What is the content of the flagUSP.txt file?
Since this is another section where we need to set up a remote desktop client, I’m going to skip over that and just give the answer. If you want a detailed walk-through on this, let me know and I will add it in.

The video listed above really helped me with this.
Windows Privesc


Conclusion

I hope this helped somewhat as this lab really tested me. I found it hard, and setting up the remote desktop was so much effort. The instructions (in my opinion) was also not as clear as I wished it would be, especially for task 5 and 6. Anyway, I got through it and now, so have you! 😀

Check out my GitHub for more.

Hi, I’m christine

I'm just a developer who loves making cool applications, games, and tools using a variety of technologies and engines. When I'm not busy coding, I enjoy sharing my knowledge of development and other tech topics that I find interesting through written content and YouTube videos.

Leave a Reply

Your email address will not be published. Required fields are marked *

Share via
Copy link