Stealth

Use your evasion skills to pwn a Windows target with an updated defence mechanism. Are you stealthier enough to evade all the updated security measures of the target?

Recon

Upon visiting the page on port 8080 we get a file upload form. It states that it is a PoweShell Script Analyser along with some details on what files we can upload.

Initial Access

Let's try to get a reverse shell with this if possible.

I found this reverse shell scrip to work. Make sure to change the IP address and Port number.

Setup a listener on the specified port.

Unexpected error with integration github-files: Integration is not installed on this space

We have a reverse shell.

We have something callled encodedflag on the desktop. It looks to be base64 encoded. We can decode it and see what it gives us.

Decoding it gives us a link for the flag.

Unfortunately no flag yet. It tells us that there is a log file present. Upon further inspection

From the contents of file.ps1located inC:\Users\evader\Documents\Task folder indicates that there is a log file present in the C:\xampp\htdocs\uploads

Remove the log.txt file and accessing the earlier link gives us the first flag.

Privilege Escalation

After some research and trial and error. Payload all the things github led me to another repository with privilege escalation.

Unexpected error with integration github-files: Integration is not installed on this space

We can use this to check for ways to get privilege escalation. Setup a python server and upload the file.

Following the instructions from the Github

We can see xampp has high vulnerability and it is run by evader user. Which we have access to via reverse shell.

We can try a simple php webshell and access it via the browser to check for more info.

We have made our shell now we need to access it via the browser.

As you can see this gives us more info.

The user has SeImpersonatePrivilege enabled this can be used to gain privilege escalation. We can use GodPotato for privilege escalation.

After uploading the file to C:\xampp\htdocs we use the program's built-in Clsid for privilege escalation and execute a simple command. (Here the output file is potato.exe)

This shows that we are root (NT AUTHORITY\SYSTEM).

We can just replace the whoami command with dir C:\Users\Administrator\Desktop check for flag on the desktop of the administrator.

We have found a flag here. We can just use type C:\Users\Administrator\Desktop\flag.txt to display the flag.

We can also add the user to the Administrators group and login via RDP and access the flag. This can be done with the following command.

Last updated

Was this helpful?