Attack Chain - Jeeves
Full Attack Path
Nmap scan → Port 50000 (Jetty 9.4.z-SNAPSHOT)
→ Manual path guessing: /askjeeves/ (box name hint)
→ Jenkins 2.87 (unauthenticated)
→ /askjeeves/script (Groovy Script Console)
→ RCE as jeeves\kohsuke
→ Nishang reverse shell (Invoke-PowerShellTcp.ps1)
→ CEH.kdbx in C:\Users\kohsuke\Documents
→ Cracked with keepass2john + john/rockyou
→ "Backup stuff" = Administrator NTLM hash
→ impacket-psexec pass-the-hash → SYSTEM
→ Root flag in ADS: hm.txt:root.txt:$DATA
Branch Points
Port 80 - IIS (Rabbit Hole)
- Fake "Ask Jeeves" search page → leads nowhere
- jeeves.PNG = fake SQL error page (red herring)
- No directories found via ffuf
Port 445 - SMB (Dead End initially, used for psexec at the end)
- Anonymous/guest access rejected
- Pass-the-hash via impacket-psexec worked with admin NTLM hash
Port 50000 - Jetty (Winner)
- CVE-2021-28164 (%2e bypass) → didn't work
- Directory traversal (36318.txt) → didn't work
- Standard wordlists → didn't contain "askjeeves"
- Manual guessing based on box name → success
Completed Steps
BOX COMPLETE