HackTheBox - Acute

00:00 - Intro 01:00 - Start of nmap, the Server Header changes based upon DNS 04:00 - Navigating to the website, discovering the “New Starter Form“ which has some key information like a welcome password and username convention 07:00 - Password spraying the Powershell Web Access (PSWA), discovering a valid credential but wrong host, word document had another host which is valid for edavies 09:15 - Playing around in the PSWA 10:00 - Looking at hidden files, discovering c:\utils\ which states its a directory that is excluded by AV 12:00 - Making the mistake of running WinPEAS inside the PSWA 14:45 - Setting up ConPtyShell to get a proper PTY reverse shell on windows 15:40 - Making some light modifications to ConPtyShell in order to evade antivirus 16:50 - Getting the ConPtyShell and showing the colors/tab autocomplete 19:30 - Running WinPEAS to show another user is logged on (and the AV Exclusions) 21:55 - Switching to Metasploit, because it makes i
Back to Top