HTB | SecNotes
This is a Windows box. You can find it here.
Skill Learned
- SQLi authentication bypass 
- Windows Subsystem for Linux (WSL) Enumeration 
NMAP/ Rustscan
IP: 10.10.10.97


Port 80

Let's run Gobuster for .php
gobuster dir -u http://10.10.10.97/ -w /usr/share/seclists/Discovery/Web-Content/common.txt -x php
Let's try admin: admin

Let's try for SQL injection

It's giving no username account

Let's try to make one and login

this means we have SQL injection in sign up/ login and we found some cred for Tyler

Foothold/ shell
Since we git the password for Tyler we can try psexec with the cred
psexec.py tyler:'92g!mA8BGjOirkL%OG*&'@10.10.10.97
It is giving an error, but we found a share new-site Let's try smbclient
smbclient \\10.10.10.97\new-site -U tyler
We saw port 8080 have IIS configured We can try to run for reverse shell,
- and upload the nc.exe to the server. 
- upload rev.php to the server. 


Start nc listener and Load the http://10.10.10.97:8808/rev.php

we have the shell
Found the user.txt

Priv Esc
We found bash.exe and wsl.exe
where /R c:\windows bash.exe 
where /R c:\windows wsl.exe
Let's run the bash.exe and spawn tty
python3 -c 'import pty; pty.spawn("/bin/bash")'
We found admin cred

we can connect via smbclient

Let's try to get a shell via Psexec

and we have a shell Found root.txt

Last updated