π§Ice
Deploy & hack into a Windows machine, exploiting a very poorly secured media server.

1. Reconnaissance
1.1 Nmap
Here we find that there is as http server running
Icecast streaming media serveron an unusual pot8000
2. Gaining access
2.1 Metasploit
Searching metasploit for icecast exploits
We are logged in as user
Darkwith no privileges
3. Privilege Escalation
3.1 UAC Bypass
Running metasploit module
post/multi/recon/local_exploit_suggesterin the meterpreter session for finding any potential vulnerabilities
We find the target is vulnerable to the
exploit/windows/local/bypassuac_eventvwrmoduleBackgrounding the current meterpreter session with
Ctrl + Z, we use the suggested module and provide the session number of our backgrounded session
After using the module, we find that there are certain processes running as
NT AUTHORITY\SYSTEMwhich is equivalent to therootuser in linux.We can also verify this if we could get names of privileged proccecess when running the
getprivscommand in the meterpreter session.Right now we are the user
Dark, but we can migrate toNT AUTHORITY\SYSTEMby using the migrate command and specifying the process name of any process running asNT AUTHORITY\SYSTEM.
Now we are
NT AUTHORITY\SYSTEM
3.2 Kiwi
Mimikatz is a rather infamous password dumping tool that is incredibly useful. Loading using the command
load kiwi(Kiwi is the updated version of Mimikatz)using the command
creds_allinkiwito list all credentials
All the password hashes and passwords are dumped.
Last updated