Blaster

Room Link: https://tryhackme.com/room/blasterarrow-up-right

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

port 5985 found

Kali

TCP/80 - HTTP

Kali

Kali

Kali

Kali

Kali

Shell

TCP/3389 - RDP

Kali

Privilege Escalation

exploit: https://sotharo-meas.medium.com/cve-2019-1388-windows-privilege-escalation-through-uac-22693fa23f5farrow-up-right

Kali

Victim(powershell)

Metasploit

Kali

Copy powershell command to a the victim in a powershell prompt. Make sure its from a privileged user.

We can run the following to keep persistance after reboot

Kali(msfconsole)

Last updated