Remote

ROOTED!

Nice Windows box, it’s very realistic and the software you have to exploit is quite common and widespread. Below some hints:

Foothold: it’s easy to identify the first service, it’s also easy to get access to a not protected share, then just Google where the juicy information is stored.

User: if you are here you know what to do now so read the PoC and think what can be more useful to run on a Windows box instead of calc.exe

Root: I owned the box following the “Remote” way, so again identify the service that is not on a default Windows installation and google for vulnerabilities of that particular version, then there is a msf module to complete the task.

PM me if you need help!

achille