Outdated - HTB
by - Thursday, January 1, 1970 at 12:00 AM
(August 14, 2022, 12:35 AM)JINXX Wrote:
(August 13, 2022, 11:46 PM)delmerherberth Wrote: cool box


Did you crack the hashes??
How so??


Just pass the hash
Reply
im stuck uwu
Reply
Thanks bro
Reply
Got root with zerologon but I think the intended method for LPE here is to abuse WSUS. But I can't seem to get it to work. Anyone got some better luck?
Reply
(August 13, 2022, 09:02 PM)yumi Wrote: :P :P :P :P :P
Reply
(August 13, 2022, 10:30 PM)yumi Wrote: if I get users i will  warn you here with more details, I tried zero logon the first time, but I didn't realize that it had worked, I always try on a windows machine, and with the name outdated I tried several vulnerabilities zero logon worked and the petitpotam partially worked because there was no way to access certsrv remotely in this machine.


(August 13, 2022, 10:27 PM)JINXX Wrote:
(August 13, 2022, 09:41 PM)undeadly Wrote: sadly bug on the box. the intended way should be probably dealing with hmail and group policies.
if an author will fix this fast, it still be playable.
 

Directory: C:\Users\Administrator\Documents


Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 6/16/2022 11:05 AM SQL Server Management Studio
d----- 6/16/2022 11:05 AM Visual Studio 2017
d----- 6/16/2022 12:07 AM WindowsPowerShell
-a---- 8/1/2022 6:38 PM 7023 hmail_cleanup.ps1
-a---- 8/3/2022 4:18 PM 978 install_updates.ps1
-a---- 6/16/2022 6:51 PM 518 wsus_group_cleanup.ps1


*Evil-WinRM* PS C:\Users\Administrator\Documents>




How did you achieve a shell with evilwinrm


How did you achieve a shell with evilwinrm

get hash from  secretsdump and acess with evil-winrm


thank you very muchhh
Reply
(August 13, 2022, 09:02 PM)yumi Wrote:


rr
Reply
Is it patched?
Reply
(August 13, 2022, 07:48 PM)fironeDerbert Wrote:
(August 13, 2022, 07:43 PM)Hacker2222 Wrote: quick root blood ..... must be cve for insta root?


Run this line by line and you'll get a ping on your port 80

telnet mail.outdated.htb 25
HELO client
MAIL FROM: <[email protected]>
RCPT TO: <[email protected]>
DATA
Subject: abc

http://10.10.XX.XX/XX
.
QUIT


Does this work for other people? This was the first thing I tried with swaks and manually and I never got any request
Reply
(August 13, 2022, 09:02 PM)yumi Wrote:
Reply


 Users viewing this thread: Outdated - HTB: No users currently viewing.