80
Last updated
Last updated
There is a file upload functionality:
We can try to replace the .htaccess file of the server since it is running apache.
Running feroxbuster we also have an uploads directory.
We can try kerberoasting:
Now to get a shell as svc_mssql:
We now get a shell at port 1234:
Run it first
For Printconfig.dll:
Then transfer to machine Then copy it:
Then in powershell:
We have shell.whatevs
:
For command execution: http://192.168.183.187/uploads/shell.whatevs?cmd=whoami
Now run powershell base64 payload
We have 2 service accounts:
We got a hash for svc_mssql. We can crack it with hashcat trustno1
Now we can use an exploit for SeManageVolumePrivilege: https://github.com/CsEnox/SeManageVolumeExploit/releases
Now should have got a shell