Optimum
Personal Rating: Easy
Last updated
Personal Rating: Easy
Last updated
sudo nmap -A <IP>
There is a html login at view-source:
There seems to be a RCE for the tool HFT 2.3 that is running on the server. I found a Python PoV (CVE-2014-6287)
rejetto_hfs_exec
There is a file called hfs.exe in the user folder
I ran LaZagne on the host to find credentials:
This could have been done with other scripts and also with manual enumeration in Powershell for example if you needed to be more stealthy or LOL
For the hfs executable I found there was a privesc called ms16_032_secondary_logon_handle_privesc
that I found after running a local exploit suggester.