Webserver with /api/getColleagues
SQL Injection with a WAF Bypass
http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet
https://blog.netspi.com/hacking-sql-server-stored-procedures-part-1-untrustworthy-databases/
https://blog.netspi.com/hacking-sql-server-procedures-part-4-enumerating-domain-accounts/
union injection to exfiltrate data
escaped unicode characters -> Bypass the waf
enumerate database -> find table Logins with usernames and hashes
bruteforce login via smb with found users and previously cracked passwords
login with evil-winrm
netstat -a to identify ports listening on 127.0.0.1
ps | Select-String "Code"
VSCode is being run in intervals, we also notice the listening ports are changing and only open when VSCode is running
Electron CEFDebugger listening (NodeJS)
https://github.com/taviso/cefdebug
we can abuse it with this tool called cefdebug
net user cyork
-> Member of the Developers Group
we can read the C:\inetpub\wwwroot Directory
somewhere inside we find MultimasterAPI.dll and MultimasterAPI.pdb
easily decompile it with dnSpy or similar tools
find credentials for the MSSQL User finder
another bruteforce attack with this password on all domain users (patator smb_login)
we can login as sbauer, also part of Remote Management -> evil-winrm
run sharphound
jorden is Member of Server Operator group
We have permissions to modify,start & stop some services
Find services that are started in the context of LocalSystem
reg query HKLM\System\CurrentControlSet\Services /f LocalSystem /t REG_SZ /s
pick one and hope for the best
Shell as NT Authority/System
gg
CTF
HTB
Windows