VulnNet: Active
Room Link: https://tryhackme.com/r/room/vulnnetactive
Scans
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/139 - NetBIOS
Kali

Kali

TCP/445 - SMB
No results. Couldn't login anonymously.
Kali
TCP/6379 - Redis
Added active.thm
Kali
Kali(redis-cli)


Kali
Kali(redis-cli)

Kali

TCP/445 - SMB
Kali

Download files
Kali
Kali(smbclient)

Kali

Initial Shell
Kali
Kali(subl)

Kali
Upload payload
Kali(smbclient)
After a few moments we get a connection
Kali

Privilege Escalation
Download SharpHound PS1
This failed because when running the script it would just hang and I had to reset the server. So After I tried with the exe.
Kali
Victim(Powershell)
Download SharpHound EXE
Kali
Victim(Powershell)
Transfer results to Kali
Victim(Powershell)
Kali(smbclient)
BloodHound
Kali #1
Kali #2
We can just drag the zip file to bloodhound to import it.

Find Shortest Paths to Domain Admins

Our user enterprise-security has write access to the GPO called "SECURITY-POL-VN"


SharpGPOAbuse
Kali
Victim(Powershell)
This task is running one command which is to add our user enterprise-security to the administrator group
Victim(Powershell)

After the change is successful we just need to push the GPU for it to work.
Victim(Powershell)

Kali

Last updated