Anthem
Last updated
Was this helpful?
Last updated
Was this helpful?
Nmap Scan
Question 1 : 80 Question 2 : 3389 Added Anthem.com to /etc/hosts to view the web page.
Disallowed Entries : /bin /config /umbraco /umbraco_client
Question 3: UmbracoIsTheBest! Question 4: umbraco Question 5: anthem.com Question 6:Solomon Grundy Question 7: SG@anthem.com
Could not get any reverse shells going on the machine.
Tried logging in with the same credentials that got me into the umbraco site. Had to remove the domain name to get the login to work SG and UmbracoIsTheBest! as the password.
Tried a few different MSFvenom payloads but they kept getting detected by Defender. Made a Hoaxshell reverse connection using Revshell.com.
Found a hidden folder with a file in it at. C:\backups\restore.txt
Was unable to open the file at first. But it did let me edit the Security Permissions.
Just so happens to be a password in this text file.
Found an RCE for this machine.
Was feeling squirrelly and wanted to try to elevate to NT authority\System. Found an article how to do it. Created my executable with msfvenom. Added Desktop folder to exceptions in Defender, I am Administrator after all. Curl the reverse shell executable to the Desktop folder. Created the service.