HackTheBox Writeup — Fuse

Hello Guys , I am Faisal Husaini. My username on HTB is “anishka” . Also join me on discord.

The IP of this box is

Running NMAP full port scan on it , we get

We have a lot of Open Ports, along with Web Port Open too, so we move onto the web part first

We see we are unable to use since the IP redirects us to a domain, as we don't have the domain in our hosts file we cant access it

After adding it to the host file, we are able to access the website and we can see that it has PaperCut Print Logger print logs, clicking on the different datesheet links

We get few users, so now we keep the username into a file

Now we use cewl to spider the website and get words for password list since on the website , there were many potential password looking words

Now we use metasploit’s smb_login module to bruteforce smb logins

Running the module , we see get only 3 successful hits on the same password

Trying to login with smbclient with the credentials we got

We see that it doesn't login and returns with a NT_STATUS_PASSWORD_MUST_CHANGE error which tells us that we have to first change the password of the user and then login

So we use smbpasswd to do the same and here we have to be quick doing these steps as the password reverts fastly

Now we check the shares of the user tlavel after changing the password

We did the same for other 2 users too

We got nothing interesting from SMB as we didnt had permissions to access most of them , so I use the new creds to login to RPC using rpclient

Since on the website we saw it was related to printers, we run the command enumprinters to enumerate printers on RPC

We see we got a password leak here, also we can get more internal users using the enumdomusers command

We save the additional users on the same file and then bruteforce it for WINRM using crackmapexec

We got a successful hit and now we use that credentials to login through Evil-WinRM

We got the user and the user flag

Checking the privileges of the current user

As you can see the privilege “SeLoadDriverPrivilege” is present in the user’s access token

At this point we can use the PoC tool EOPLOADDRIVER, which will allow us to:

  • Enable the SeLoadDriverPrivilege privilege
  • Create the registry key under HKEY_CURRENT_USER (HKCU) and set driver configuration settings
  • Execute the NTLoadDriver function, specifying the registry key previously created

The tool can be invoked as shown below:

EOPLOADDRIVER.exe RegistryKey DriverImagePath

The RegistryKey parameter specifies the registry key created under HKCU (“Registry User{NON_PRIVILEGED_USER_SID}”, while the DriverImagePath specifies the location of the driver in the file system.

We have uploaded the Capcom.sys file and our EOPLOADDRIVER.exe to load the driver

We ran the command so that it loads the Capcom driver

We uploaded our Exploit along with netcat for windows and a batch file which will get triggered and help us get reverse shell

Now we run the exploit and check our netcat listener

We got shell as SYSTEM and now we get the root flag

Hacker | Bug Hunter | Python Coder | Gamer | Reverse Engineering Lover

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store