A detailed walkthrough of exploiting a Windows domain controller running Gibbon LMS. The attack chain begins with exploiting CVE-2023-45878, an unauthenticated file write vulnerability in Gibbon v25.0.00 that allows uploading a PHP webshell. Database credentials are extracted and a user hash is cracked to gain SSH access via

29m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as w.webserviceShell as f.frizzleShell as m.schoolbusShell as nt authority\system

Sort: