HTB - Bounty

Getting Root
Tools used:
Nmap
Enumerating HTTP

Nikto
Gobuster
Testing transfer.aspx



Here is the link:
Getting a Reverse Shell
Uploading the web.config file


I can also confirm using tcpdump:
Privilege Escalation
Download the executable to the target using certutil
Executing the exploit
Started a Listener
Got Reverse Shell as SYSTEM
Last updated