HTB | SecNotes
Last updated
Last updated
This is a Windows box. You can find it here.
SQLi authentication bypass
Windows Subsystem for Linux (WSL) Enumeration
IP: 10.10.10.97
Let's run Gobuster for .php
Let's try admin: admin
Let's try for SQL injection
It's giving no username account
Let's try to make one and login
this means we have SQL injection in sign up/ login and we found some cred for Tyler
Since we git the password for Tyler we can try psexec with the cred
It is giving an error, but we found a share new-site Let's try smbclient
We saw port 8080 have IIS configured We can try to run for reverse shell,
and upload the nc.exe to the server.
upload rev.php to the server.
Start nc listener and Load the http://10.10.10.97:8808/rev.php
we have the shell
Found the user.txt
We found bash.exe and wsl.exe
Let's run the bash.exe and spawn tty
We found admin cred
we can connect via smbclient
Let's try to get a shell via Psexec
and we have a shell Found root.txt