#cybersecurity #hacking #penetration-testing #hack-the-box #metasploit #privilege-escalation #port80
Port 80 was open so we go to the IP address to see what web content is being served. We see the same HttpFileServer 2.3 here. We could google this or just check metasploit.
Possible because Metasploit is auto-detecting the target
I background the first meterpreter session and search for suggested post-breach exploits
The only option that needs to be configured here is the session
If sessions aren't know you can just run show sessions
Once the suggester runs, I find what I'm really looking for which is a way to ==privilege escalate== from the "Kostas" user to the system authority/root
We get system authority from the exploit
Work thru this again without metasploit.
<iframe width="560" height="315" src="https://www.youtube.com/embed/kWTnVBIpNsE" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe> <iframe width="560" height="315" src="https://www.youtube.com/embed/bTxnobhJ_b8" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>