Also rooted, a very well made box and a nice touch of realism, really liked the approach of sqli something i’ve never done before at least not in this way.
I expected to see an output in the browser and i thought i was doing something wrong.
hint for user : Do it manual, don’t overthink it.
root : i felt so dumb after tried everything but was using the wrong name for the service, i really don’t know what i was thinking.
Hint : Once you gain access through that poweshell web access, it is really right in front of you, google it
@npaskov said:
I’m stuck on root, got the service I need but somehow it doesn’t execute my payload, could someone give a hint
Make sure you are using the correct service name, no, not the one from the output of “ps”.
I suppose you have figured out by now that msf payloads wouldn’t execute “as is”
I am sure I have the service that is exploitable. I create an exe file and upload it. When I start and stop the service the exe file disappear from the server and I am also not getting a reverse shell. The exe was created with msfvenom using shikata_ga_nai option.
don’t want to read all topic because don’t want obtain a spoiler
Could you please provide following - i found * databases with **p but can’t found any creds or somethins usefull excepts few logins (which i setup for bruteforce with wm msf module - but don’t have any result). Now it’s seems as rabbit hole. Could you please confirm, i’m on right direction or not?
With some help I finally got my unpriv user shell. I’ll drop the hint that in these environments DNS resolution isn’t always available to services on a remote server.
You can use Linux to get access to the remote service. Windows VM is not required.
Still no root! I am able to compile and get reverse shell after doing what it seems to be right with the proper service, but that shell is still under unprivileged user and nothing higher.
Can I obtain some assistance to validate what i am missing in the process?
@iswearimnotalu said:
I’ve managed to get the classic Windows hash through Resr and xp_* of \G****\s***y, but cracking it with john I get ‘NO PASSWORD’, so doesn’t seem to me the right road.
Any hints?
Use hashcat with rockyou.txt and best64.rule
why does my hashcat always give me this
Dictionary cache built:
Thanks to everyone who has posted thus far! Little nudges here and there have helped me learn a bunch.
If anyone wouldn’t mind nudging me a little bit, I am struggling with the s***. I found a user and enumerated the db, but I wasn’t able to find a hash. I’m trying to use x**********, I think I’m missing something regarding the syntax because I keep getting errors.
i’m on root’s way now
can i ask how to bypass :Program ‘*****.’ failed to run: This program is blocked by group policy. For more information, contact your syste
m administrator.?
I think I have a method of getting a root shell, i’ve attempted it, but I didn’t work as I exepcted - can someone DM me regarding this, run my hypothesis by them?