Retro

Room Link: https://tryhackme.com/room/retro

Scanning

Kali

nmap -A $VICTIM

Scan all ports

port 5986 discovered. Potentially we can use this later for WinRM.

Kali

HTTP port 80

Kali

Kali

Kali

Burp

wpscan identified that XML-RPC was enabled but it wasn't very useful going forward.

Hydra

I tried to bruteforce wades account but no luck. Looking back later the password was not in the below password list but it was in rockyou.txt but it would have taken awhile to find it.

wade added his password to one of the blog posts and from there I could login to wp-login.

Reverse Shell

Reverse Shell Failed Attempt

revshell.php code

Kali

I realized my reverse shell wasn't working as it is a Windows box. I uploaded a web shell and ran commands to realize this.

PHP web shell

PHP web shell #2

This shell was better as it gave me a reverse shell rather than just a web one.

Kali

Load Invoke-winPEAS.ps1 into memory.

Kali

Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded

Invoke-winPEAS.ps1

Victim(powershell)

Load PowerUp.ps1 into memory.

Kali

Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded

PowerUp.ps1

Victim(powershell)

Shell

After a lot of time wasted I realized there was no where to write files to and this account was a dead end. Then tried to RDP in as wade since we had a potential password for him.

Kali

Load PowerUp.ps1 into memory.

Kali

Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded

PowerUp.ps1

Victim(powershell)

Kali

Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded

Invoke-winPEAS.ps1

Victim(powershell)

Privilege Escalation Option #1

For this I wouldn't normally know how to detect but when you open up chrome the exploit is already bookmarked.

Kali

Download https://packetstormsecurity.com/files/download/14437/hhupd.exe

Victim(cmd)

Navigate to C:\Windows\System32 and type in *.* to show all files.

Open the cmd prompt and it open as an Administrator account, but note if you already had Internet explorer open it won't work so make sure it is closed before starting

Privilege Escalation Option #2

Since the web user had more access than Wade but we couldn't write anywhere I made a folder that they could write to.

Kali

Victim(cmd) - Wade

Kali

Victim(cmd) - retro

Privilege Escalation Option #3

This is still with Juicy Potato but just a slightly different way using nc64.exe instead of a reverse shell.

Kali

Victim(cmd) - Wade

Kali

Victim(cmd) - retro

Last updated