Steel Mountain

Initial access

...

Retrieving shell (without metasploit)

Modified PoC

Note that we have to replace the rev_shell_payload variable in the script above, to the name of the generated payload from msfvenom, wit the .exe or .cmd extensions.

In general, the generated payloads by msfvenom (refer below) with the .exe works to provide us with a shell. However, a payload with .cmd may not work as expected.

Windows reverse TCP payload

Windows (Powershell) reverse TCP payload

meterpreter payload

Catch shell/meterpreter

Privilege escalation

Enumeration

  1. PowerUp.ps1 (PowerSploit)

  1. WinPEAS

After enumeration, we discover that there is a particular service named AdvancedSystemCareService9 with an unquoted service path, and the CanRestart parameter set to True. We can use various tools to discover the name of the vulnerable service.

Getting more information about services

Now, we can exploit the found service. Refer to the write-up below for more information:

Last updated