Media

This is not a writeup, just my notes about the machine.

Machine information

Operating System: Microsoft Windows Server 2022 Standard

Chain: False (standalone compromise)

Credentials

Username
Password
Method
Scope

ENOX

1234virus@

NTLM Steal

✅ Valid Usernames

🔑 Passwords list

Information Gathering

Service Enumeration

HTTP

  • CMS: Umbraco

  • Programming Language: PHP

Possible Usernames:

  • Parveen Anand

  • Diana Petersen

  • Larry Parker

Foothold

The application included a feature that permitted file uploads, which would then be reviewed by an individual, resulting in the theft of NTLM hashes.

Lateral movement as local service user

During the enumeration the tester found and PHP file that create a folder with the name firstname, lastname and email as md5hash into C:/Windows/Tasks/Uploads/ and store all the uploaded files into it.

The filename is predictible and can be exploitable via Symlinks on Windows to rediret all the files (PHP Web Shell) into C:\xampp\htdocs and obtain a Reverse Shell into the system.

Obtaining the directory name and creating the php web shell.

Uploading the malicious php web shell

Accessing the php web shell as local service

Privilege Escalation to NT Authority System

Using FullPowers.exearrow-up-right to enable all the default token for service account.

Tool: FullPowers.exearrow-up-right

Abusing SeImpersonatePrivilege to compromise computer.

Binary: GodPotato-NET4.exearrow-up-right

Last updated