CyberSecLabs - Engine - Windows [Walkthrough]
PinkDraconian
ā¶ļø YouTube: https://www.youtube.com/c/PinkDraconian š¦ Twitter: https://twitter.com/PinkDraconian šµ TikTok: https://www.tiktok.com/@pinkdraconian ā¹ļø LinkedIn: https://www.linkedin.com/in/robbe-van-roey-365666195/ š Discord: PinkDraconian#9907 š· Instagram: https://www.instagram.com/robbevanroey/ šøļø Website: http://pinkdraconian.d4rkc0de.com/ šØāš» HackTheBox: https://www.hackthebox.eu/home/users/profile/129531 Twitter: https://twitter.com/PinkDraconian Discord: PinkDraconian#9907 Website: http://pinkdraconian.d4rkc0de.com/
Platform: CyberSecLabs
Platform Link: https://www.cyberseclabs.co.uk/
Category: Machine
OS: Windows
Challenge name: Engine
Difficulty: 1/10
00:00 Introduction 00:10 NMap scan 00:40 Gobuster on webroot 01:15 Gobuster found blog page 02:30 Logging into admin page with admin:admin 02:50 Checking blogengine version to look for exploits 03:30 Testing RCE vulnerability on blogengine 06:00 Uploading nc so we have a slightly better shell with certutil 09:30 Uploading and running winpeas 10:50 Using autologon credentials to login with evil-winrm ... https://www.youtube.com/watch?v=wpiA3wMawfw
145798037 Bytes