Qouted

We will download the machine and configure its network as we did in DC01.
Enumeration:
The first thing we will do is to find the IP of that target machine to proceed, and since its a windows machine we can perform SMB Sweep:

Now we will run nmap scan:

As nmap told us that anonymous login is allowed on ftp, lets authenticate to the ftp server:

Lets try if we can upload something to here:

And we can upload to the ftp using put command:

As we can see we have write access to this ftp.
Lets try to access the file we uploaded through the browser:

We can access it.
Exploitation:
Lets upload an aspx file to get a reverse shell:
We will use the reverse shell from this website:
https://raw.githubusercontent.com/borjmz/aspx-reverse-shell/refs/heads/master/shell.aspx


Set up a netcat listener and go to this file in the browser:


As we can see it is hanging which means it is waiting for something to be done, which is our shell:

Post-Exploitation:
If we check our privileges:

We will see that we have SeImpersonatePrivilege, we can use metasploit to escalate our privileges:

Configure the options:

Run it:

Now lets get a meterepreter shell:


Lets try to search for exploits:


Metasploit shows that there is several attacks we can try to exploit:

And we will use the reflection juicy one:


And here is the root flag, you can find the users flag in the quoted desktop.
Last updated