HTB - Heist

Getting Root:
Nmap
Enumerating SMB
Enumerating http
Gobuster



Decrypting the Cisco Passwords


Enumerating SMB Again
Enumerating winrm
Using evil-winrm
Privilege Escalation
Checking the Processes
Using the Sysinternals Suite from Microsoft
Started with the first process which is using PID 752
Transferred the file to my Kali box using evil-winrm
Inspecting the file after transfer
Got a shell as SYSTEM
Last updated