
I Canât Even Say Less Chatting More Hacking Because Nah This Box Deserves Some Respect, Really Educational đ„ž
I Advice You Give It a Go First Before Following The Steps Here There are Different Ways Of Getting Root, Two I Know Of đ
So no futher ado letâs jump right into it đš
Firing Up The Machine We Get An Ip address
ENUMERATION đ

- So many posts are open I cantâs start listing them but yh weâll focus on the mains
- Port 139, 445 is Open that can be connected to with smbclient
- smbclient -L \IP-Addy

- One share allows anonymous login, Connect to it and get the files
- Whatâs the file type ?
- Whatâs the file used for ?
- Can the file password be cracked ?
- Whatâs In the zip you cracked
- Whatâs the file ? Can it also be cracked ?

While cracking the pfx file if it shows no hass loaded thereâs a slieght issue with your hash, remove any â, âbâ â

Extract the pfx file
- openssl pkcs12 -in [yourfile.pfx] -nocerts -out [drlive.key]
- openssl pkcs12 -in [yourfile.pfx] -clcerts -nokeys -out [drlive.crt]
- openssl rsa -in [drlive.key] -out [drlive-decrypted.key]

Initial Foothold
Remember the zipâs name ? winrm ? Login via evil-winrm

So Weâre in
![]()
You can run any enumeration script of your choice just run upload âscriptâ (make sure itâs in the directory youâre running evil-winrm from)

run your sript, youâll notice the powershell history is there, view it

So we can see a series of instructions

We repeat the commands, and weâre able to successfully act as the svc_decoy user


Privilege Escalation
So we see now have to think how to get root after all we have some credentials already Remeber in the smbclient folder there was a folder of Help blah blah it contained things about ldaps and we from our scans we have ldap3 open ports So we dump ldaps

We have admin password
So now you do understand

We have to change the commands in history

Copy the password from that dump (my pass is different cos i had to reset the machine half way)

Great we can run actions as admin
we upload nc.exe through our evil-winrm
Turn off win defend or whitelist the upload path (c:\users)

run netcat revshell

on your attacking machine youâll catch a shell
![]()



AND WE ARE DONE
LOOK FOR FILES ON YOUR OWN, itâs your little task
Hit me up on Twitter if you run into any issues