Welcome researcher! thanks for stopping by :)
post @ 2024-11-03

In this guide, I’ll walk you through essential Windows privilege escalation techniques, covering various methods from kernel exploits to application misconfigurations. We’ll start by setting up our lab environment and tools, then dive into specific methods for escalation.

Table of Contents

  1. Registry
  2. Insecure GUI Applications
  3. Scheduled Tasks
  4. Installed Applications
  5. Port Forwarding
  6. Startup Applications
  7. Conclusion

Lab Setup and Tools

Lab Setup

For this guide, I’m using a virtual environment with Kali Linux as the attack machine and Windows 10 as the target machine. environment is configured with default security settings and Windows defender was disabled to focus on learning the techniques.

![Image Placeholder: Lab Setup]

List of tools used:

Read More
post @ 2024-09-22

alt text


INFO
CTF NAME SolarLab
Operating System Windows
Diffculty Medium
Retire date 21 Sep 2024
Points 35

Description

SolarLab begins with an SMB share containing a spreadsheet of usernames and passwords. By exploiting a website that displays distinct error messages for incorrect usernames versus wrong passwords, combined with analyzing the username format, I was able to identify valid credentials.

Once logged in, I leveraged CVE-2023-33733 in the reportlab PDF generation process to achieve Remote Code Execution (RCE) and obtain a shell.

For lateral movement, to escalate privileges to the openfire user, method takes advantage of CVE-2023-32315 in OpenFire to create a user and upload a malicious plugin for RCE.
With this access, I decrypted a password from the OpenFire configuration, which served as the administrator’s password.


INFORMATION GATHERING

Read More
⬆︎TOP