Blaster
Room Link: https://tryhackme.com/room/blaster
Initial Scan
Kali
Scan all ports
port 5985 found
Kali
TCP/80 - HTTP
Kali
Kali
Kali
Kali
Kali
Shell
TCP/3389 - RDP
Kali
Privilege Escalation
exploit: https://sotharo-meas.medium.com/cve-2019-1388-windows-privilege-escalation-through-uac-22693fa23f5f
Kali
Victim(powershell)
Metasploit
Kali
Copy powershell command to a the victim in a powershell prompt. Make sure its from a privileged user.
We can run the following to keep persistance after reboot
Kali(msfconsole)
Last updated