Job

This is not a writeup, just my notes about the machine.

Machine information

Operating System: Windows 2016

Chain: False (standalone compromise)

Information Gathering

Service enumeration

HTTP:80

Possible attack path: Please send your application to career@job.local ! We recently switched to using open source products - please send your cv as a libre office document.

SMTP

The server is vulnerable to an open relay, which means that any unauthenticated user can send emails through it.

Initial Access

During the assessment, the tester configured a Sliver server and generated a beacon named http-vulnlabs-4444.exe for use throughout the assessment.

To create the malicious macro:

  1. Go to Tools > Macros > Organize Macros > Basic

  2. By selecting you document, set a Name.

To configure auto open:

  1. Go to tools > customize > open document > select macro.

Lateral movement as iis apppool\defaultapppool user

During the enumeration, it was discovered the user jack.black belongs to JOB\Developers domain group, which possess Full Permission over C:\inetpub\wwwroot directory.

Uploading a antak web shell

Getting a reverse shell using sliver as IIS APPPOOL\DefaultAppPool

Privilege escalation as NT Authority System

Binary: GodPotato-NET4.exearrow-up-right

Last updated