@3s073r1k said:
Hey guys… Been stuck at this PowerShell webapp forever now, my ps game is weak obviously… I see a path to escalate but I can’t run what I need to run that arbitrary file I can create if anyone can offer a push in the right direction it’d be greatly appreciated!
I’m in exactly the same spot. I’m aware of the vulnerability and exploit (unless I’m way off track), but I’m having trouble bypassing/evading preventative measures.
Yeah I’m pulling out hair here ? I’ve tried all the previous methods I knew which were not many and been Googling with no luck too
@3s073r1k said:
Hey guys… Been stuck at this PowerShell webapp forever now, my ps game is weak obviously… I see a path to escalate but I can’t run what I need to run that arbitrary file I can create if anyone can offer a push in the right direction it’d be greatly appreciated!
I’m in exactly the same spot. I’m aware of the vulnerability and exploit (unless I’m way off track), but I’m having trouble bypassing/evading preventative measures.
Yeah I’m pulling out hair here ? I’ve tried all the previous methods I knew which were not many and been Googling with no luck too
I’m in the same boat… I successfully bypassed the PS restriction so I was able to get interactive shell, but when tried to execute vulnerability I hit into another wall… Could someone PM me what am I missing?
Hi guys!
I found that enumeration is the main part on initial steps, used big wordlist. Now trying to get RCE but usual way doesnt work. Can anyone give a hint?
Hi, I have user and pass (pass cracked from hash) and I’m trying to login to ‘command prompt’ via web but I’m getting error that connection cannot be established, when I try with Metasploit module for same access type, in HTTP response I’m getting 500 error. After reset, I’m getting same error… is something wrong with VM or I’m doing something wrong???
@deda1mraz said:
Hi, I have user and pass (pass cracked from hash) and I’m trying to login to ‘command prompt’ via web but I’m getting error that connection cannot be established, when I try with Metasploit module for same access type, in HTTP response I’m getting 500 error. After reset, I’m getting same error… is something wrong with VM or I’m doing something wrong???
You’re probably missing a couple specific special characters in front of your username, that’s what got me for a while
@deda1mraz said:
Hi, I have user and pass (pass cracked from hash) and I’m trying to login to ‘command prompt’ via web but I’m getting error that connection cannot be established, when I try with Metasploit module for same access type, in HTTP response I’m getting 500 error. After reset, I’m getting same error… is something wrong with VM or I’m doing something wrong???
You’re probably missing a couple specific special characters in front of your username, that’s what got me for a while
Hm, now it works without any tweaking, just with regular u/n and p/w…
EDIT: I can log in but when I try to do anything I’m getting “Internal server error” or similar errors…
EDIT: Now it works fine…
Trying to get root.txt. Found interesting thing. Created payload exe. But how to trigger this thing? Dos exploit doesnt work. Legitimate thing restarting, doesn’t work too… can anyone give a hint?
EDIT 1: got root THX @3zculprit for last hint. I was so inattentive…
Guys, could you pls assist me with generating and delivering malicious file to the victim?
I have tried different cmdlets and tools, do not work.
I know that I need to generate file, then execute that file o the victim and I will receive something that will help me.
This was a nice box learn a lot too!!
Thanks to @MTOTH for his hints!!! it helps me a lot!
for privilege scalation all i can say its search the vuln for the app once you read about the vuln you will now what to do but dont focus too much on getting a meterpreter session like a did ?
so the credentials are lying around somewhere waiting to be extracted?
my enum-fu only turned up re and at_c****t. follow those rabbit holes, or keep looking elsewhere? i would have hoped for a fileupload transfer.aspx like that other box