Stealth
Room Link: https://tryhackme.com/r/room/stealth
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/8000 - HTTPS
Kali
TCP/8080 - HTTPS

Initial Shell
Kali
Shell #1 attempt
This shell didn't work
Kali
Kali(subl)
Shell #2 attempt
This shell worked
Kali
Change this line to Kali IP
Kali(subl)

Victim

Kali


Victim
refresh the page and we can see the flag now.

Lateral Movement
Going by privs we don't have much but since we have web I tried adding a new shell and seeing if we get anything from it.
Victim

Kali
Victim

Even though we're the same user this shell has SeImpersonatePrivilege enabled

Privilege Escalation
I tried printspoofer but I couldn't execute the exe.
Attempt #1
Kali
Victim
Attempt #2
We can see a EFI folder so looks like a clue on what to do.
Victim

Kali
Victim
Victim(p0wny-shell)
Kali

Last updated