Blaster
Room Link: https://tryhackme.com/room/blaster
Initial Scan
Kali
nmap -A $VICTIM
Scan all ports
port 5985 found
Kali

TCP/80 - HTTP
Kali

Kali

Kali

Kali


Kali
Shell



TCP/3389 - RDP
Kali

Privilege Escalation
exploit: https://sotharo-meas.medium.com/cve-2019-1388-windows-privilege-escalation-through-uac-22693fa23f5f


Kali
Victim(powershell)










Metasploit
Kali
Copy powershell command to a the victim in a powershell prompt. Make sure its from a privileged user.


We can run the following to keep persistance after reboot
Kali(msfconsole)
Last updated