Steel Mountain

February 14, 2024

Task 1:

Task 2:

Task 3:

Look closely there's actually a space in between dots

Task 4:

Download the exploit from this link or just use the script below

Then modified it to look like this for python3

Then you need to open up a web server through your linux and a netcat listener

Just run the exploit twice

The first one is going to grab the nc.exe which will open a listener to the victim machine and the second run will get the reverse shell to ours. Or just run it multiple times to work

Then get winpeas into the victim machine for priv esc

The result shows that ASCService.exe can be access by user bill

Last updated