fix references
This commit is contained in:
parent
fd1fec5663
commit
8e4e47a9d8
16 changed files with 19 additions and 27 deletions
|
@ -6,14 +6,6 @@
|
|||
|
||||
**Lame** is an easy Linux box which was released back in March 2017. It features a common vulnerability which could be exploited using a metasploit module.
|
||||
|
||||
## **Requirerements :**
|
||||
|
||||
* [Linux commands](../../CS/LTerm.html)
|
||||
* [Nmap](../../CS/nmap.html)
|
||||
* [Searchsploit](../../CS/searchsploit.html)
|
||||
* [Python](../../CS/python.html)
|
||||
* [Netcat](../../CS/netcat.html)
|
||||
|
||||
|
||||
|
||||
## **Part 1 : Initial Enumeration**
|
||||
|
|
|
@ -459,7 +459,7 @@ Weird, we don't have permissions to see what files are there in the wwwroot dire
|
|||
}
|
||||
|
||||
|
||||
Looking at the results, we see a few interesting information : admin@support.htb, and a hash sha256 91c077fb5bcdd1eacf7268c945bc1d1ce2faf9634cba615337adbf0af4db9040. So navigating over to [hashes.org](hashes.org/search.php) we paste our hash and see that sadly, hashes.org can't find it for us, so we navigate over to the attachments directory
|
||||
Looking at the results, we see a few interesting information : admin@support.htb, and a hash sha256 91c077fb5bcdd1eacf7268c945bc1d1ce2faf9634cba615337adbf0af4db9040. So navigating over to [https://hashes.org](https://hashes.org/search.php) we paste our hash and see that sadly, hashes.org can't find it for us, so we navigate over to the attachments directory
|
||||
|
||||
|
||||
*Evil-WinRM* PS C:\inetpub\wwwroot> cd attachments
|
||||
|
|
|
@ -603,7 +603,7 @@ However there's a simpler method:
|
|||
|
||||
### Don't forget your "ninja" password
|
||||
|
||||
Click here to logout [Session](logout.php)
|
||||
Click here to logout Session >> logout.php
|
||||
|
||||
And we have an encrypted ssh key! so let's crack it:
|
||||
|
||||
|
|
|
@ -96,7 +96,7 @@ And now we're onto something! This may be a Windows IOT machine, and the [presen
|
|||
C:\windows\system32>
|
||||
--------- <****HResultResult | type: 1, payload length: 4, HResult: 0x0> <****OutputStreamResult | type: 11, payload length: 125, payload peek: 'b'Microsoft Windows [Version 10.0.17763.107]\r\nCopyri''>
|
||||
|
||||
Very weird box, we can't even use the whoami command, but let's try to get nc.exe onto the box, we're going to get [xc.exe](../Tools/xc.html) instead:
|
||||
Very weird box, we can't even use the whoami command, but let's try to get nc.exe onto the box, we're going to get [xc.exe](../Tools/xc/index.md) instead:
|
||||
|
||||
|
||||
[ 10.10.14.13/23 ] [ /dev/pts/74 ] [HTB/Omni/SirepRAT]
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue