Windows Privilege Escalation - Legacy OS (Server 2008, Windows 7)

Could not find a topic for this so here are some hints how to solve these:

To connect the target, use some options:
xfreerdp /v:10.129.19.228 /u:htb-student /p:‘HTB_@cademy_stdnt!’ +clipboard /dynamic-resolution -cert:ignore /sec:rdp
(also you can try to use these options if needed: /tls-seclevel:0 /timeout:20000)

Server 2008:
the example is quite nice, although you may need to find another way to escalate your privileges
use post/multi/recon/local_exploit_suggester
to find another exploit

Windows 7:
I couldn’t run the privesc ps script located in c:\tools
just attack the host using metasploit and find another exploit
eg. eternalblue

Cat you please help me with this one Server 2008: i have tried everything nothing really works please help

Are you able to help get a shell with meterpreter? I keep getting the following:
[-] Exploit failed: Errno::EACCES Permission denied - bind(2) for 10.xx.xx.xx:445

Try Windows Exploit Suggester. You won’t need to run it remotely.
You’ll just need the results of a ‘systeminfo’ and run in your machine.

1 Like

I ended up following this guide to get the reverse shell, then I was able to follow along as normal.

Same here. I cant connect with metasploit like example, the msvenom to take a reverse shell doesnt work… any advice, hint or solution to get the session?

SOLVED: If you put a listener with netcat doesnt work, but with metasploit (use multi/handler) yep.