// CLIENT_SYSTEM_DATA

IPV4_ADDR: 0.0.0.0ISP_PROV: DETECTING...OS_KERNEL: DETECTING...BROWSER: ...STATE: ...CITY: ...

> CONNECTION_ESTABLISHED:SECURE

Hi,
I'm
Prem

SOC_Analyst

Terminal

msf6 exploit(handler) >run
[*] Started reverse TCP handler on 127.0.0.1:4444
[*] Sending stage (175686 bytes) to 192.168.1.1
[*] Meterpreter session 1 opened (127.0.0.1:4444 -> 192.168.1.1:5678)
meterpreter > getuid

Server username: ubuntu-workstation\low-priv-user

meterpreter > run post/multi/recon/local_exploit_suggester
[*] 192.168.1.1 - Collecting local exploits...
[+] 192.168.1.1 - exploit/linux/local/sudo_baron_samedit: Valid
meterpreter > use exploit/linux/local/sudo_baron_samedit
meterpreter > run
[+] Escalating privileges...
[+] Success! Target compromised.
meterpreter > getuid

Server username: root

meterpreter > run post/multi/manage/open_rdp_session
[*] Target: UBUNTU-WORKSTATION-01 (192.168.1.1)
[*] Authenticating with local session tokens...
[*] Access Granted. Initializing GUI...

ubuntu-24.04 [Running]

Ubuntu Logo
Firefox
Terminal
AboutMe.md

AboutMe.md

Certs.md

Certs.md

Projects.md

Projects.md

Contact.md

Contact.md