A detailed walkthrough of exploiting a Windows domain controller running Gibbon LMS. The attack chain begins with exploiting CVE-2023-45878, an unauthenticated file write vulnerability in Gibbon v25.0.00 that allows uploading a PHP webshell. Database credentials are extracted and a user hash is cracked to gain SSH access via
Table of contents
Box InfoReconShell as w.webserviceShell as f.frizzleShell as m.schoolbusShell as nt authority\systemSort: