80

There is a file upload functionality:

We can try to replace the .htaccess file of the server since it is running apache.

Running feroxbuster we also have an uploads directory.

We have shell.whatevs:

For command execution: http://192.168.183.187/uploads/shell.whatevs?cmd=whoami

Now run powershell base64 payload

We have 2 service accounts:

We can try kerberoasting:

We got a hash for svc_mssql. We can crack it with hashcat trustno1

Now to get a shell as svc_mssql:

We now get a shell at port 1234:

Now we can use an exploit for SeManageVolumePrivilege: https://github.com/CsEnox/SeManageVolumeExploit/releases

Run it first

For Printconfig.dll:

Then transfer to machine Then copy it:

Then in powershell:

Now should have got a shell

Last updated

Was this helpful?