VulnNet: Active

Room Link: https://tryhackme.com/r/room/vulnnetactivearrow-up-right

Scans

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/139 - NetBIOS

Kali

Kali

TCP/445 - SMB

No results. Couldn't login anonymously.

Kali

TCP/6379 - Redis

Added active.thm

Kali

Kali(redis-cli)

Kali

Kali(redis-cli)

Kali

TCP/445 - SMB

Kali

Download files

Kali

Kali(smbclient)

Kali

Initial Shell

Kali

Kali(subl)

Kali

Upload payload

Kali(smbclient)

After a few moments we get a connection

Kali

Privilege Escalation

Download SharpHound PS1

This failed because when running the script it would just hang and I had to reset the server. So After I tried with the exe.

Kali

Victim(Powershell)

Download SharpHound EXE

Kali

Victim(Powershell)

Transfer results to Kali

Victim(Powershell)

Kali(smbclient)

BloodHound

Kali #1

Kali #2

We can just drag the zip file to bloodhound to import it.

Find Shortest Paths to Domain Admins

Our user enterprise-security has write access to the GPO called "SECURITY-POL-VN"

SharpGPOAbuse

Kali

Victim(Powershell)

This task is running one command which is to add our user enterprise-security to the administrator group

Victim(Powershell)

After the change is successful we just need to push the GPU for it to work.

Victim(Powershell)

Kali

Last updated