Member-only story

Legacy WriteUp | SMB Remote Code Execution

Onurcan Genç
7 min readJun 7, 2024

--

Greetings everyone,

Today, I will be conducting an in-depth analysis of an older HackTheBox machine known as “Legacy.” The relative ease of compromising this machine allows for a thorough examination of the vulnerabilities present and an exploration of the underlying causes for this security flaw.

1) Reconnaissance

Anyway, lets start with reconnaissance:

Initially, I decided to conduct basic scan against machine because I am dealing a CTF. That’s why, it is not important to make noise on network.

I saw that we are dealing such Windows instance.

We have SMB, RPC and NetBIOS. Except SMB, other ones are more correlated to communication protocols. By default, I will firstly enumerate the SMB service.

In order to achieve that operation, I decided to conduct a enum4linux scan:

enum4linux -a 10.10.10.4

Besides, I wanted to access by using smbclient

However, It does not give me valuable results:

Lastly, I recognized that I have not conducted nmap scan with using service scan (-sV) + NSE vuln script+ full-range port scan:

--

--

Onurcan Genç
Onurcan Genç

Written by Onurcan Genç

Offensive Security Specialist | Tech Enthusiast Welcome to my playground !

Responses (1)