Relevant

Room Link: https://tryhackme.com/room/relevantarrow-up-right

Scanning

Initial Scan

nmap -A 10.10.145.102

Scan all ports

135/TCP - msrpc

TCP/445 - microsoft-ds

There is a share but we couldn't access with smbget but smbclient worked. There was only one file called passwords.txt

Can't download files with smbget
Downloaded password file

The file contained two bade64 encoded strings which decoded into users and passwords

Credentials Found

Scanning for vulnerabilities

Decided to scan for vulnerabilities and nmap detected that the host is vulnerable to m17-010 (EternalBlue)

The exploit did not work as expected. It seems the credentials do not work for smb so now we must explore a different route.

TCP/80 - HTTP

We can see the passwords.txt file from the browser

Initial Shell

We can upload files to the nt4wrksv and view the files on webserver on port 49663 so that means we should be able to add a reverse shell.

Kali #1

Kali #2

Privilege Escalation

Exploit: https://github.com/dievus/printspooferarrow-up-right

As SeImpersonatePrivilege is enabled for the user we can use Printspoofer as it works on Windows 10 and Server 2016/2019.

Victim

Kali

Victim

Last updated