I donāt want to give much away in here, but is there anyone who could reach out and help me with the exploit? It is erroring out on me and I canāt figure out how to resolve it
I can and will provide details in PM. I donāt want to put specifics in here and give spoilers
Thanks for the suggestions here. Iām mainly a noob and just learning, so for those like me. Donāt forget during user enum how to read into all files.
For root I got it to the point of having a password from TV but was lost as to what to do with it, then i looked at the musical way and found a good reference to help me via enough google fu. It was in fact super easy to do.
USER: a bit of enumeration showed me the right vulnerability to use, then it was not immediate for beginners like me to understand what that opened port did, but after finding the s** file it was not so difficult to use the informations there to obtain a shell and get user flag.
ROOT: spent a lot of time trying to figure out how to do a privilege escalation. Thanks @RangerRocket for the hint. After realizing what I was missing, I obtained a root shell.
Hope this is not too much of a spoiler. PM me if you need some help!
a. Iāve already gotten user, found whatās attached, enumerated, used what i found to do the authN RCE on the web service
b.) stuck in a basic non-interrctive non ps reverse shell as the app***** user
So basically, I donāt like this non- interactive shell, looking for suggestions to get me an interactive shell so i can do enumeration of rpriv esc more easilly
Iāve tried MSV -f psh paylods but canāt get it to fire in the remote RCE
Iāve looked around Github for interracgive ps1 examples but they embed the lhost and lport into them ā¦ also try to cert*** method but i have permission issues even n temp ā¦
seems dumb but i really donāt want to use this shell, feel like itās holding me back cuz i canā't see errors
I have already rooted the box using the U****C way but i am stuck with the TV way. I have got the TV Creds but dont know what to do next with those. I am new and this the 2nd windows box for me . Please PM me with a nudge
So we found the a**** and s***** creds in the N** folder. Iām using Burp to bruteforce one login while my friend tries the F** directory, but so far no luck. We also found the A**** webshell but canāt figure out how to access it. Can anyone DM me with a hint? Thank you!
Iām pretty new to this, working on Remote. So far, Iāve gotten the user flag.
As of now, I think Iāve managed to pull TV credentials, but canāt figure out how to use the ā ā ā ā ā ā things.
I feel like Iām pretty close on this. I canāt figure out how to escalate from this point with the credentials Iāve got (or think Iāve got). If someoneās done this with the TV method and wouldnāt mind shooting me a DM with a nudge in the right direction, or so that I can provide slightly more specific information for a nudge to get this sucker.
Iām pretty new to this, working on Remote. So far, Iāve gotten the user flag.
As of now, I think Iāve managed to pull TV credentials, but canāt figure out how to use the ā ā ā ā ā ā things.
I feel like Iām pretty close on this. I canāt figure out how to escalate from this point with the credentials Iāve got (or think Iāve got). If someoneās done this with the TV method and wouldnāt mind shooting me a DM with a nudge in the right direction, or so that I can provide slightly more specific information for a nudge to get this sucker.
Same hereā¦
Got user , Upgraded my shell so i could invoke some better PS for enumerations
Found the TV, read the article and which led me to the exploit, found the thing they left unattended
At the moment, trying to replay the creds using a common powershell command but my my reverse gets terminated every-timeā¦ maybe AV? tried using a PS reverse shell to avoid AV but that doesnāt fire off for some reason ā¦
Got root with the musical number after deciding to throw in the towel with the remote. However, Iād like to know how to do the remote way, if anyone whoās done that wants to DM me with nudge/hint/whatever from where I am, Iād appreciate it.
Hello, I have a shell as user and currently I see something that I can āabuseā to to PrivEscalation by I*****-S**********e , but nothing Iām trying works. Tried different listeing ports, versions, etc,. Anyone that can help me out please? Thanks.