β‘Vulnerable Services
π― Overview
π Third-Party Software Enumeration
Installed Programs Discovery
# Enumerate installed applications
wmic product get name
# Example output with vulnerable software:
Name
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.28.29910
VMware Tools
Druva inSync 6.6.3 # β Vulnerable version
Microsoft Update Health ToolsService Process Mapping
# Check for running services on specific ports
netstat -ano | findstr 6064
# Expected output:
TCP 127.0.0.1:6064 0.0.0.0:0 LISTENING 3324
# Map process ID to running process
get-process -Id 3324
# Verify service details
get-service | ? {$_.DisplayName -like 'Druva*'}π₯ Druva inSync 6.6.3 Exploitation
Vulnerability Details
PowerShell Exploit PoC
π― HTB Academy Lab Solution
Lab Environment
Detailed Walkthrough
1. Connect via RDP
2. Enumerate Druva inSync Service
3. Prepare Attack Infrastructure on Pwnbox
4. Configure Druva Exploit Script
5. Start Netcat Listener on Pwnbox
6. Execute Druva Exploit
7. Receive SYSTEM Shell
8. Access Flag
π Additional Vulnerable Services
Common Third-Party Targets
Service Discovery Methodology
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated