Lustrous2
This is not a writeup, just my notes about the machine.

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
FTP
DNS
HTTP
Initial Foothold
Abusing Weak Credentials
Brute forcing Kerberos
Setting up Kerberos in my local computer
Requesting Ticket Granting Ticket to authenticate into Web application
Setting up Firefox to use Kerberos authentication
Key
Value

Discovering Path Traversal vulnerability

Abusing Path Traversal to download web.config file.
Capturing ShareSvc's NTLMv2 Hash
Brute forcing NTLMv2 Hash and retrieving the plain text credential.
Analyzing data with Bloodhound

Authenticating into the application as Share Admin user

Analyzing LuShare.dll

Executing curl command to confirm Remote Command Execution

Sending Reverse shell using rcat tool

Privilege Escalation
Discovering Velociraptor software
Creating an API client configuration as Administrator
Sending Reverse shell using rcat tool to gain access as NT Authority System

Last updated