Steel Mountain

Room Link: https://tryhackme.com/room/steelmountainarrow-up-right

Walkthrough

Introduction

Who is the employee of the month?

Initial Access

Scan the machine with nmap. What is the other port running a web server on?

Take a look at the other web server. What file server is running?

Google this

What is the CVE number to exploit this file server?

Use Metasploit to get an initial shell. What is the user flag?

Option #2 Without Metasploit to get an initial shell. What is the user flag?

Exploit Link: https://www.exploit-db.com/raw/39161arrow-up-right

For this exploit we usually just need to change the ip_addr and local_port to our nc listener

Because I performed this on a tryhackme attacker box which has port 80 in user to login through web I had to change the exploit to get the nc.exe from us on a different port.

Use Metasploit to get an initial shell. What is the user flag?

Privilege Escalation

Kali

Windows

Kali

I couldn't delete the ASCService.exe but I could replace it when I copied the file over with certutil

Victim

Kali

Victim

Last updated