Attack Defence: Windows Basic Exploitation #4

Attack Defence: Windows Basic Exploitation #4

Hello everyone, I have returned to tackle part four of my series on Windows exploitation, in this episode you will learn how to exploit Process Builder utility to gain access to windows environment.

I recommend you to first try out this lab on Attack Defence =>

As usual, we will start with info gathering.


Using nmap to get open ports

nmap --top-ports 50000

As expected, HTTP Port 80 is open and Process Builder is being served

Also we are provided with the login credentials admin:password


If you have read my last post Windows Basic Exploitation #3. You know what the exploit is. In this I will simply execute it to retrieve the flag

You can then find the flag in C:\flag.txt

You can connect me on the following platforms

The awesome image used in this article was created by BrooklynSnobs.