RDP
The current user, divine
, being part of the Remote Desktop Group
allows the user to RDP into the target system and the target RDP server is up and running. Interestingly, the divine
user already has an active RDP session. Lastly, a FileZilla client password has been recovered. Given, it was found in the home directory of the current user, there is a high likelihood that it belongs to the divine
user.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ xfreerdp /u:divine /p:'ControlFreak11' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0
Password reuse confirmed
Successfully RDP’d into the target system
Remote Mouse
The version information of the target remotemouse instance has been confirmed through a successful exploitation of the arbitrary remote command execution. The instance also suffers from a local privilege escalation vulnerability. Given the instance is running with privileges of
SYSTEM
, successful exploitation would lead to Privilege Escalation