HackPark is a Windows machine featuring BlogEngine.NET exploitation. Learn to brute force web logins with Hydra, exploit CVE-2019-6714 for initial access, and use Windows Scheduler for privilege escalation.
The creepy clown on the website is Pennywise from Stephen King's "IT". Don't let him distract you from the real horror: unpatched web applications!
Reconnaissance
The website is running BlogEngine.NET. Check the login page:
Brute Force with Hydra
To brute force the login, we need to understand the POST request:
ASP.NET uses __VIEWSTATE and __EVENTVALIDATION tokens. Hydra can handle these, but you need to capture the exact parameter names.
Hydra Syntax
Format: "page:parameters:failure_string". Use ^USER^ and ^PASS^ as placeholders. Escape $ with \$ in parameter names.
BlogEngine.NET Exploitation
After login, identify the BlogEngine version:
CVE-2019-6714 Exploitation
1
Download Exploitsearchsploit -m aspx/webapps/46353.cs
2
Modify ExploitEdit IP and port in PostView.ascx
3
Upload FileAdmin → Content → Posts → Edit → File Manager → Upload PostView.ascx
4
TriggerVisit /?theme=../../App_Data/files to execute
Upgrading to Meterpreter
Privilege Escalation
The Windows Scheduler service runs with SYSTEM privileges and has interesting log files:
When a SYSTEM service executes a writable file, replace that file with a malicious payload to get SYSTEM access!
Getting Flags
Knowledge Check
Key Takeaways
- Web login brute forcing requires understanding POST parameters
- BlogEngine.NET 3.3.6 is vulnerable to authenticated RCE
- Scheduled tasks running writable executables enable privilege escalation
- Always check service executable permissions on Windows
- Log files reveal scheduled task behavior and timing