I am stuck on question 2 of the Vulnerability Scan Modules section; I have checked for and tried to exploit multiple vulnerabilities but the only one I have successfully exploited was the zerologon exploit which does not allow me to read the c drive. can you point me in the right direction.
Hi, I’m having issues connecting to the target. Nothing is connecting back to my chisel client even though the target is responding to ping. Am I doing something wrong?
If anyone comes here and can help me with the 3rd question about accessing DEV01.
feel like i tried everythings including the ms-connecter file (not LNK since it’s blocked) and i’m totally glued. The int speak about reusing somethings but all the pass i have have lead nowhere except for the inital user they were good for.
any help would be appreciated.
ty
Hi,
could you please give me a hint to “Gain access to the DEV01”. I have tried password spraying on different services using obtained passwords (also using a --local-auth switch) but without good results. I have actually 4 users with valid pass.
Thank you for tip @moayad11 . Now I am stuck to acquire credential for user that can list service/computer account. I have tried back and enumerates folders to get some interesting files, brute force with many pass combinations and use other escalation paths like null session for that user.