Operators may be able to escalate privileges on a well-patched system and with the absence of misconfigurations if there is some vulnerable third-party software installed in the system in question
The latter can occur if the employee’s user account belongs to the administrators group or any other privileged group or simply has the necessary rights to install any kind of software
Now let’s imagine that the given software creates one or several services during its installation setup, and one of those services run as LOCAL SYSTEM. If so, we might achieve code execution as the latter if the software has any security flaw or published vulnerability
Enumeration
Listing Installed Software/Programs
System Directories
i.e. “Program Files” and “Program Files (x86)“
dir C:\Progra~1 # Program Filesdir C:\Progra~2 # Program Files (x86)
COM | CIM
CMD & PS
wmic product get name
PS
Get-WMIObject -Class Win32_Product | Select Name, Version
Once we list all the installed software in the target, there is an application that stands out from the rest, namely Druva Sync
A quick Google search shows that the installed version is vulnerable to a command injection attack through an RPC exposed service, which is accesible from 127.0.0.1:6064
Since the exploit above runs the command below, we have to setup a Reverse Shell, so the target will request this resource and we will receive an incoming shell to the specified TCP port