Media
This is not a writeup, just my notes about the machine.
Machine information

Credentials
Username
Password
Method
Scope
Information Gathering
Service Enumeration
HTTP

Foothold
Lateral movement as local service user
Obtaining the directory name and creating the php web shell.
Creating the Symlinks to point to the web root directory
Uploading the malicious php web shell

Accessing the php web shell as local service

Privilege Escalation to NT Authority System
Using FullPowers.exe to enable all the default token for service account.

Abusing SeImpersonatePrivilege to compromise computer.

Last updated