Relevant
Last updated
Last updated
Enumeration machine.
Samba enumeration.
Log in to samba to one of the shares.
Getting file to our machine.
In passwords.txt file we can found encoded strings.
We can decode these strings by using CyberChef.
They are usernames and passwords.
The good news is that we can also access to this file from the browser using the correct port.
Now we have to make a shell file in aspx (windows os) format and put the shell to smb server.
An ASPX file is an Active Server Page Extended file. Open one with your web browser or a text editor.
Starting listener and going to new file from browser to make a connection.
First flag:
Privilege escalation.
The /priv command shows you what permissions you have.
After spending some time looking for a solution, I found this:
We have to download that exploit to our machine and upload to victim system, using same way like before : samba.
Starting exploit, getting system admin and flag.
DONE