Blaster
Intro
Room Info

π Name
π― Target IP
10.10.27.22
π Difficulty level
π’Easy
π² Subscription type
Free
πͺ OS
Windows
Recon
Discover IIS Webserver hidden directories
Navigate to
http://10.10.27.22/Retro/http://10.10.27.22/retro/index.php/2019/12/09/ready-player-one/
π
Wade:parzival
π© Read user.txt file.
Local Recon
Check Internet Explorer history.
CVE-2019-1388- Windows Privilege Escalation Through UAChhupd.exeon desktop
Privilege Escalation
Run
hhupd.exeto exploit the privilege escalation vulnerability present in the Windows Certificate Dialog box, a bug in the UAC mechanismcmduser:nt authority\system

π© Read root.txt file.

Exploitation
Run the following command on the target machine
copy it in a file and host the file on a Python http server
Open the link on the target machine
http://10.18.65.48:8000/payload
Copy the code and paste it in the opened
CMDCheck the spawned reverse shell in Metasploit

Persistence
Windows Defender blocked the persistence service payload in this case

Add a new user instead and give it administrative privileges
Last updated
Was this helpful?