Flexing the Command Injection: A Peek into My Hack The Box NetMon Exploit

Nisha P
Women in Technology
4 min readDec 12, 2023

--

Welcome to another exciting entry in my cybersecurity learning journey. As part of my 100 Days of Cybersecurity challenge, Day 32 brought me face-to-face with the NetMon machine on Hack The Box. This experience wasn’t just about conquering another challenge; it was a profound learning opportunity to understand and exploiting command injection vulnerabilities, specifically CVE-2018–9276. In this blog, I’ll detail my approach, the intricacies of the vulnerability, and the broader implications for cybersecurity.

Understanding NetMon and Its Vulnerabilities

NetMon, classified as an ‘easy’ difficulty box, is a Windows-based platform designed to mimic real-world vulnerabilities. It’s an ideal learning tool for those starting in cybersecurity or looking to brush up on their skills. The central component of NetMon that caught my attention was the PRTG Network Monitor software, notoriously running an outdated version susceptible to command injection attacks.

PRTG Network Monitor Admin Panel

The Nature of Command Injection

Command injection is a critical security flaw that allows an attacker to execute arbitrary commands on a system’s operating system. This type of vulnerability can lead to complete system compromise if exploited correctly. In NetMon, this vulnerability was tied to the PRTG Network Monitor’s outdated version, identified specifically as CVE-2018–9276.

https://www.cvedetails.com/cve/CVE-2018-9276/

My Approach to Exploitation

The journey to exploiting this vulnerability began with anonymous access to NetMon’s FTP server. Through this access, I retrieved crucial PRTG configuration files. Analyzing these files helped me understand the underlying system architecture and pinpoint the default login credentials to the application, enabling me to gain access to the admin panel.

Nmap scan results reveal that FTP with anonymous login is enabled
Initiating an anonymous FTP connection to the target machine

Utilizing my findings, I executed a series of commands that exploited this vulnerability. The success of these commands allowed me to elevate my access to a SYSTEM shell, the most privileged level in Windows environments, thereby gaining full control over the NetMon machine to download the configuration file containing the login credentials to the application server.

Transferring files from target machine to attacker machine over FTP
Command Injection Execution

Mitigation and Best Practices

This experience underscored the importance of regular software updates and vigilant network security practices. The primary mitigation for this vulnerability is updating the PRTG software to a version that patches this command injection flaw.

Additionally, restricting unnecessary services, like anonymous FTP access, can greatly reduce the attack surface and protect against similar vulnerabilities.

Conclusion

Tackling the NetMon machine was more than just a challenge; it was a vivid reminder of the constant vigilance required in cybersecurity. It highlighted the critical need for regular updates and stringent network monitoring to prevent potential breaches.

As I continue my 100 Days of Cybersecurity challenge, I look forward to sharing more insights and lessons learned from this fascinating field.

Stay tuned for more updates, and remember, the path to cybersecurity expertise is a journey of continuous learning and adaptation!

Connect with me on LinkedIn

Follow my 100 Days of CyberSecurity Challenge here

--

--