Someone give me somehint of that box, i find a hash or some user using SN** enum, try ik*fo** but dont get anything, i need some technical or keyword for google search
Use connect scans (nmap -sT, …). Will probably help. Another thing: you won’t see more open ports than you saw from the service where you found the credentials for the connection
Working on the first part and trying to connect. Kind of flying blind with my configuration files and command options though. Upon executing c*****-**d my packets get sent but from the output they aren’t being accepted. Eventually the application reports the “peer is not responding” and the application quits. Also I see that the application is connecting to a related yet filtered UDP port (per my Nmap scans). Is this normal behavior? Any hints via DM would be appreciated.
I got a w** type of shell on the box i can even read the user flag, what I found odd is that i can get the files to upload to execute it, I tried different shells, that can give me a stable “regular” shell but I can get anything to execute… did someone else take this road to user? did someone found how to execute files that you upload?
@dplastico said:
I got a w** type of shell on the box i can even read the user flag, what I found odd is that i can get the files to upload to execute it, I tried different shells, that can give me a stable “regular” shell but I can get anything to execute… did someone else take this road to user? did someone found how to execute files that you upload?
i managed to get a meterpreter reverse https shell after a few trys it seemed windows defender was stopping them.