Steel Mountain
Last updated
Last updated
Room Link: https://tryhackme.com/room/steelmountain
Introduction
Who is the employee of the month?
Scan the machine with nmap. What is the other port running a web server on?
Take a look at the other web server. What file server is running?
Google this
What is the CVE number to exploit this file server?
Use Metasploit to get an initial shell. What is the user flag?
Option #2 Without Metasploit to get an initial shell. What is the user flag?
Exploit Link: https://www.exploit-db.com/raw/39161
For this exploit we usually just need to change the ip_addr and local_port to our nc listener
Because I performed this on a tryhackme attacker box which has port 80 in user to login through web I had to change the exploit to get the nc.exe from us on a different port.
Use Metasploit to get an initial shell. What is the user flag?
Kali
Windows
Kali
I couldn't delete the ASCService.exe but I could replace it when I copied the file over with certutil
Victim
Kali
Victim