Skip to content

Internal -- Proving Grounds (write-up)

Difficulty: Easy / Beginner Box: Internal (Proving Grounds) Author: dsec Date: 2025-12-09


TL;DR

Windows Server 2008 SP1 vulnerable to MS09-050 (srv2.sys SMB code execution). Metasploit module gave instant root shell.


Target info

  • Host: 192.168.188.40
  • OS: Windows Server 2008 Standard 6001 Service Pack 1
  • Services discovered: SMB (139, 445)

Enumeration

sudo nmap -Pn -n 192.168.188.40 -sCV -p- --open -vvv

Nmap results

Service details

OS detection

Identified Windows Server 2008 Standard 6001 SP1 -- likely vulnerable to EternalBlue or similar SMB exploits.


Exploitation

Checked for MS17-010 (EternalBlue) first:

nmap -p445 --script smb-vuln-ms17-010 192.168.56.140

MS17-010 check

Confirmed vulnerable, but searchsploit scripts gave errors. Fixed with ChatGPT but still did not work.

Searchsploit attempts

Ran broader SMB vulnerability scan:

nmap -p139,445 --script "smb-vuln*" 192.168.188.40

SMB vuln scan

Found CVE-2009-3103 -- Microsoft Windows 'srv2.sys' SMB Code Execution (MS09-050).

Reference: https://www.exploit-db.com/exploits/40280

Used Metasploit:

msfconsole
search ms09-050
use 0

Got root shell.

Root shell


Lessons & takeaways

  • When EternalBlue (MS17-010) scripts fail, check for older SMB vulns like MS09-050
  • Windows Server 2008 SP1 is vulnerable to multiple SMB exploits
  • Metasploit is reliable when standalone exploit scripts break