HTB | Devel
Last updated
Last updated
This is a Windows box. You can find it here.
kitrap0d (ms10-015)
IP: 10.10.10.5
anonymous login is allowed
Found files
Nothing interesting was found here
Let's do gobuster
we found http://10.10.10.5/aspnet_client/system_web/
try putting test.txt
Since there is asp, we make a payload for reverse shell
and put in the server via FTP
load the page http://10.10.10.5/devel.aspx
and boom you have a session on our nc
and run use post/multi/recon/local_exploit_suggester
on trying exploit/windows/local/ms10_015_kitrap0d
I got the shell
Fund user.txt
Found root.txt