RDP


The current user, divine, being part of the Remote Desktop Group allows the user to RDP into the target system and the target RDP server is up and running. Interestingly, the divine user already has an active RDP session. Lastly, a FileZilla client password has been recovered. Given, it was found in the home directory of the current user, there is a high likelihood that it belongs to the divine user.

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/mice]
└─$ xfreerdp /u:divine /p:'ControlFreak11' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0

Password reuse confirmed Successfully RDP’d into the target system

Remote Mouse


The version information of the target remotemouse instance has been confirmed through a successful exploitation of the arbitrary remote command execution. The instance also suffers from a local privilege escalation vulnerability. Given the instance is running with privileges of SYSTEM, successful exploitation would lead to Privilege Escalation