HackTheBox - ServMon

Nmap scan results
nmap -sC -sV -oA nmap-allportscan -p- 10.10.10.184
Enumerating FTP Server (Anonymous login allowed)


NVMS-1000 Running on port 80
There is a LFI Vulnerability present for this CMS Software. We can check for it using searchsploit command in linux.


There was a note saying Nadine left Passwords.txt file on Nadine's Desktop. We can browse that using Local File Inclusion.

Using crackmapexec to get Valid user with credentials

I tried to access SMB Shares for Nadine user, but didn't get anything. Instead I only got read access to $IPC Share. (Not so useful)

SSH Access as Nadine

Exploiting NSClient++ (Remote Code Execution)
We also have NSClient++ running on port 8443, we can get the web interface password for that by browsing the following directory.

Another way to get the password is using nscp.exe executable given on the following website itself.

The allowed_hosts are set to 127.0.0.1 and that's the reason we can't access it remotely. We can use SSH Forwarding to bypass this.


Go to Settings -> External Scripts -> Scripts -> Add New. Then fill in the following details.

Then click on Reload to restart the service and if you will check the queries, this is how it should look.

Now you can run the script by clicking on pleasework that we just created and then further clicking on Run.


Let's try to get a shell now. Get the nc (netcat) executable using curl command.
Now listen on port 9001 and run the script to get the reverse connection back.

Last updated
Was this helpful?