Relevant
Room Link: https://tryhackme.com/room/relevant
Scanning
Initial Scan
nmap -A 10.10.145.102
Scan all ports
135/TCP - msrpc

TCP/445 - microsoft-ds
There is a share but we couldn't access with smbget but smbclient worked. There was only one file called passwords.txt


The file contained two bade64 encoded strings which decoded into users and passwords
Credentials Found
Scanning for vulnerabilities
Decided to scan for vulnerabilities and nmap detected that the host is vulnerable to m17-010 (EternalBlue)

The exploit did not work as expected. It seems the credentials do not work for smb so now we must explore a different route.
TCP/80 - HTTP
We can see the passwords.txt file from the browser

Initial Shell
We can upload files to the nt4wrksv and view the files on webserver on port 49663 so that means we should be able to add a reverse shell.
Kali #1

Kali #2

Privilege Escalation
Exploit: https://github.com/dievus/printspoofer
As SeImpersonatePrivilege is enabled for the user we can use Printspoofer as it works on Windows 10 and Server 2016/2019.
Victim


Kali
Victim


Last updated