Squid
Privilege Escalation via Scheduled Task Privilege Recovery + SeImpersonatePrivilege Abuse (PrintSpoofer)
Summary
🧵Let's Unpack
Enumeration
# NMAP
nmap -p- -T5 192.168.166.189 -vv
cat ports | awk '{split($0,a,"/"); print a[1] ","}'| tr -d "\\n"| awk 'BEGIN {FS=OFS=","} NF--'
>
135,139,445,3128,49666,49667
# step 2 - Dive deeper into the ports found in step 1
sudo nmap -sC -sN -A -oN nmapFull -p 135,139,445,3128,49666,49667 -A 192.168.166.189
Accessing the site on port 8080
Getting a reverse shell
Privilege Escalation:
Last updated