192.168.174.121 (WEB02)

Flags Obtained

Local:
    None
    
Root:
    1cef898bdfecd3e713dcefcd60869ef9

Enumeration

sudo nmap -sV -sC -sT -T4 -A -p- --open 192.168.174.121 -Pn -o target.121map

Exploitation

Attempt Manual Code Execution

Only ping command works

Attempting one liner reverse shells

No response

Attempted uploading msfvenom reverse shell payload

  • No response from listener

Attempting Script Payload

Initial Access

Privilege Escalation

  • Identified SeImpersonatePrivilege with whoami /priv

Using God Potato to get a root reverse shell

Using PrintSpoofer to get a local root shell

Admin Enumeration

WinPeas

Mimikatz

Username
Hash
Password

Joe

08d7a47a6f9f66b97b1bae4178747494

Flowers1

Last updated