root@rumais:~# inspect blue
Blue
Windows-focused room covering service enumeration, exploitation, and Active Directory concepts. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.
Room Details
Built from supporting notes and artifacts. This room is grouped under Windows and AD.
Summary
Blue is generally solved by identifying legacy SMB exposure on Windows, validating the EternalBlue attack surface, gaining a shell through the SMB vulnerability path, and then performing standard post-exploitation to recover proof files and system-level access.
Notes
Recon
- The most important discovery is legacy SMB exposure on a Windows host with the right version profile for
MS17-010. - Vulnerability validation confirms that the box is built around the EternalBlue attack path.
Initial Access
- The intended route is to exploit the SMB service and obtain a shell through the EternalBlue chain.
- Once code execution lands, the rest of the room shifts into straightforward Windows post-exploitation.
Privilege Escalation
- The exploit itself effectively provides a high-privilege context, so the remaining work is to stabilize access and recover the proof material.
- The box is designed to teach the exploitation chain and the basic post-exploitation workflow that follows.
Security Notes
- Legacy SMB exposure remains one of the clearest examples of how a single unpatched service can become full host compromise.
- Network segmentation and aggressive patching are still the most important defenses against exploit chains like EternalBlue.
- Even training boxes like this highlight why old Windows attack surface should be retired or isolated quickly.
Collected Output
initail-nmap
# Nmap 7.91 scan initiated Mon Jun 14 17:57:07 2021 as: nmap -sC -sV --script vuln -oN initail-nmap 10.10.227.193
Nmap scan report for 10.10.227.193
Host is up (0.94s latency).
Not shown: 991 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open tcpwrapped
| rdp-vuln-ms12-020:
| VULNERABLE:
| MS12-020 Remote Desktop Protocol Denial Of Service Vulnerability
| State: VULNERABLE
| IDs: CVE:CVE-2012-0152
| Risk factor: Medium CVSSv2: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P)
| Remote Desktop Protocol vulnerability that could allow remote attackers to cause a denial of service.
|
| Disclosure date: 2012-03-13
| References:
| http://technet.microsoft.com/en-us/security/bulletin/ms12-020
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0152
|
| MS12-020 Remote Desktop Protocol Remote Code Execution Vulnerability
| State: VULNERABLE
| IDs: CVE:CVE-2012-0002
| Risk factor: High CVSSv2: 9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C)
| Remote Desktop Protocol vulnerability that could allow remote attackers to execute arbitrary code on the targeted system.
|
| Disclosure date: 2012-03-13
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0002
|_ http://technet.microsoft.com/en-us/security/bulletin/ms12-020
|_ssl-ccs-injection: No reply from server (TIMEOUT)
|_sslv2-drown:
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49158/tcp open unknown
49159/tcp open unknown
Service Info: Host: JON-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED
| smb-vuln-ms17-010:
| V