🪟Nickel

IP: 192.168.66.99

Enumeration

Nmap scan

nmap 192.168.66.99 -p- -sV -Pn

Port 80

Port 3333

Had to get a hint here. All I had to do was add the content length🤦‍♂️

Seems to be a user account ariah:NowiseSloopTheory139 for SSH login.

Shell

Found a file that looks interesting: C:\ftp\Infrastructure.pdf Had to look at how to copy this over since sending it to wwwtree was messing up the file.

PDF is password protected. Cracked it with john.

Tried making a reverse shell with msfvenom here but it kept crashing whenever the shell would come back.

Added ariah to local admin group on the machine and enabled RDP. Both commands had to be URL encoded to send.

net localgroup Administrators ariah /add

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f

Connected with RDP.

xfreerdp /u:ariah /p:NowiseSloopTheory139 /v:192.168.66.99

Root

Got an admin command prompt.

Last updated

Was this helpful?