Jeeves is not overly complicated, however it focuses on some interesting techniques and provides a great learning experience. As the use of alternate data streams is not very common, some users may have a hard time locating the correct escalation path.
Starting with our Nmap scan.
We have a few interesting ports open.
80 is showing us the following webpage
50,000 is showing the following
Running gobuster against this, we get the following results (/askjeeves)
From here we are going to get script console
From here it looks like we can run Groovy script
Googling “Groovy script exploit” we have a reverse shell that we can attempt to use
https://gist.github.com/frohoff/fed1ffaab9b9beeb1c76
We can take this script and update to our local host
Opening a netcat listener, and running the script, we get our shell
From here we just have to navigate to the user desktop and we get our user flag
Navigating to our admin files, we get blocked. So we have to escalate our privileges
From here we are going to launch Metasploit.
We are going to search and use the module exploit/multi/script/web_delivery
This will allow us to create a meterpreter shell using the web delivery abilities of Metasploit
We are going to copy that and attempt to run on our victim.