Access
Last updated
Last updated
Seems to be a domain controller with the ports open
Website present
There is an upload on the website: We also have an upload directory:
Now we can modify the .htaccess
To create new .htaccess
file:
Now uploading it. We can access it at http://192.168.218.187/uploads/shell.evil: Then generating a msfvenom payload:
Now we can execute it after transfering to get a shell:
Might be possible but the process is most likely running as svc_apache.
Nope
Now using kerberoasting we got the hash:
Now to get a shell as svc_mssql:
Now we can use an exploit: https://github.com/CsEnox/SeManageVolumeExploit/releases Run it first
For Printconfig.dll:
Then transfer to machine Then copy it:
Then in powershell:
Run it first
For Printconfig.dll:
Then transfer to machine Then copy it:
Now cracking it:
We have SeManageVolumePrivilege:
Now should have got a shell