Hacking Alfred (thm)

The Alfred box from thm teaches us more about attacking jenkins and abusing the SeImpersonatePrivilege to perform priv esc on a windows system... A quick nmap scan showed that three common tcp ports were open - port 8080 seemed to be the most likely one to be serving jenkins. It would be easy at this point to navigate to the webpages, but I wanted to try eyewitness on them first. This may seem pointless (and it is!) for such a room as this one, but eyewitness is useful when web app testing, especially if there are lots of domains to check. It gives us a good high level overview of what we are up against. The first step with eyewitness is to create a file which contains the domains to be targeted. I created a .txt file to do this. Eyewitness provides us with an html report which can be opened. In this example, the results have been saved into a directory using the -d flag. We can see the results there, too. The scan unsurprisingly revealed that jenkins was running on port 8...