HTB Office Hard Machine 1720381784
HTB Office Hard Machine 1720381784
● Stage2:
○ Kerberos enumeration
○ SMB shares
○ Passwords From Kerberos Pre-Authentication Packets
○ Gain Access web management
● Stage3:
○ Getting shell as web_account
○ RunasCs + information disclosure into tstark shell
○ Enumeration source codes!
○ Exploiting LibreOffice
○ Reading DPAPI Encrypted Secrets with Mimikatz
○ add users to local administrators groups, GPO abuse
○ End
Hello again!
https://github.com/Acceis/exploit-CVE-2023-23752
In System>Site template>
We can create new file and upload our shell.
Here is command :
Lets get back into our first shell directory C:\xampp\htdocs\
And look into files. In the resume.php
The PHP code in C:\xampp\htdocs\internal\resume.php lets you
upload files with the following extensions: docm, docx, doc, and odt.
It saves the files in the applications folder. I could upload a resume
and hope that another user opens it, which would let me run code on
their system. Since LibreOffice is installed, it’s likely the application
used for odt files.
https://github.com/elweth-sec/CVE-2023-2255