eCPPT - Client-Side Attacks CTF 1

,

I am stuck on Task 3: Exploit a vulnerable file server on web.prod.local. Any guidance would be appreciated :slight_smile:

I know the server is Rejetto HttpFileServer httpd 2.3 after enumeration and using remote port forwarding. Also setup the autoroute through Meterpreter so can ping it from the first compromised host, mail.server.local. Been trying to use the rejetto_hfs_exec metasploit module, i’ve tried a bind shell and a reverse_tcp shell but am unable to exploit web.prod.local. Can someone explain to me what I am doing wrong please

I have the same issue. I’ve tried attacking web.prod.local in every possible way, but nothing works.
I thought there might be a problem with the lab, so I contacted support, but they told me everything is working fine and that the rejetto_hfs_exec module is not the correct method.

1 Like

Ahh good to know mate, least that can be ruled out! If you find a solution please post it back here, been stuck on this for ages!

I’ve been struggling with this one as well. I have used both different rejetto exploits. With different payloads, tried it with proxies and with port-forwarding.

No matter what I do it seems I am never able to get a shell. I have reached a point where I am not sure what I am supposed to be trying next anymore.

I tried my hand at it again today. I fiddled around with a more responsive version of the correct rejetto exploit for a bit, to confirm it worked properly. And it did, so the flaw was with how I used it in metasploit somewhere. I ended up using a reverse shell to get access.

This is the portfwding I used to get a connection back.
portfwd add -R -L kaliIP -l kaliport5555 -p pivotport6666

I have a feeling this may not have been the intended way to do it, but for the life of me I could not get a bind_tcp to work.

Hope this helps,
@andycuthbertson-79cb
@Ski2per_Sec
If you still needed it anyway.
Best Regards.

1 Like

Hi all,

I even got stuck on Task 2: (the phishing mail)

When using the send_mail.py script, I get a reply from the SMTP server that the file type (.exe) is not allowed.

I then wrote a small script to test different executable file types, and I found only one type that is not blocked by the mail server (.hta). When sending a malicious .hta payload, i do not receive a callback to my listener.

Am I missing something trivial here? This feels like a weird point to get stuck!

Thanks in advance for your help!

Kind regards,

Joe

Hey All,

This Thread is a bit old, and I would like to think you all have already passed this skills check, but I will write this for anyone searching this up in the future, cuz they’re stuck xD, since I just solved it.

So instead of using Metasploit to exploit it, search online for a downloadable exploit that might work :wink:

Keep at it, and if you have any more questions, please message me.

Regards,
Z

have you solve it cuz I got stuck in this task.

1 Like

hi guys,

hope that help i run the sendemail task direcly in and dont try an exe. its blocked directly it worked on my side with .hta > and the listener i set up was not working with msfconsole so i try it with the normal nc -lvnp 4444
hope that helps. rg, tom

Hi all, I managed to get it to work by generating a .hta payload, and setting up a multi/handler in Metasploit. Turns out I was just not patient enough: the “recipient” on the other side executes the .hta after a minute or so (or maybe 2). So the standard way does work!

I haven’t had a lot of time to tackle Task 4, but I will edit this post if I clear that one.

Joe

Thank you for providing the guide above for task 2. I passed task 2 but now I still have no clue on how to work on task 3…

I tried these following command to set up socks proxy and nmap with proxy chain.

Summary

run autoroute <web.prod.local’ip>-s /20
search socks_proxy
use 0
set SRVPORT 9050
set VERSION 4a
exploit
jobs
proxychains nmap web.prod.local -sT -Pn -F
portfwd add -R -L -l 5555 -p 6666

the nmap only show http on 80 for web.prod.local, how do you guys know it is rejetto?

And I tried rejetto_hfs_rce_cve_2024_23692, but not sure which payload should I use and what config should I use, how should I proceed?