Lab
Initial low privilege access
CVE Exploitation ****
RFI, e.g. php-reverse-shell.php
Directory traversal password file found
FTP access point to upload asp-reverse-shell.asp
Macro Exploitation
WordPress Admin upload reverse shell at 404 page
hydra login password
SMTP/POP read an email to obtain a user credential
Default user account password (admin/admin, root/root)
**** most of the case for getting the initial low privilege access.
Common Privilege Escalation
Exploitation Type (suggested solution)
SMB Exploit (zzz_exploity.py)
OS Kernal Exploit (Dirty Cow)
Application Vulnerability (reverse tcp shell upload)
Seimpersonate group (Juicy Potato)
SMB Configuration
file upload (reverse TCP shell)
password (using default password)
ByPass UAC (minitakz)
Same password hash using HtB (minitakz)
Sudo escape (sudo -l)
SUID file permission
Docker escape (Docker PE /usr/bin/docker run –it –v /root:/fkclai ubuntu
Completed Lab
10.11.1.5 (Alice) 10.1.1.7 10.11.1.8 (phoenix) 10.11.1.10 (mike) 10.11.1.13 (disco) 10.11.1.14 (bob) 10.11.1.20 (SV-DC01) 10.11.1.21 (SVCLIENT73) 10.11.1.22 (SVCLIENT08) 10.11.1.24 (SVCLIENT73) 10.1.1.246[IT Dept] (SEAN) 10.1.11.31 (RALPH) 10.11.1.35 (PAIN) 10.11.1.39 (leftturn) 10.11.1.44 10.11.1.50 (bethany) 10.11.1.71 (alpha) 10.11.1.72 (beta) 10.11.1.73 (gamma) 10.11.1.75 (bruce) 10.11.1.79 10.11.1.101 (Harder) 10.11.1.111 10.11.1.115 (Tophat) 10.11.1.116 (Dotty) 10.11.1.118 10.11.1.123 (xor-APP59) 10.11.1.121 (xor-APP23) 10.11.1.122 (xor-APP07) 10.11.1.120 (xor-APP59) 10.11.1.128 (DJ) 10.11.1.133 (gh0st) 10.11.1.136 (sufferance) 10.11.1.141 (fc) 10.11.1.146 (SUSIE) 10.11.1.209 (kraken) 10.11.1.217 (hotline) 10.11.1.220 10.11.1.221 10.11.1.222 10.11.1.223 (jeff) 10.11.1.226 (joe) 10.11.1.227 (jd) 10.11.1.229 (mail) 10.11.1.231 (mailman) 10.11.1.234 (core) 10.11.1.237 (humble) 10.11.1.241 (Parrot)
Last updated