Vulnerable Services

Enumerating Installed Programs

C:\htb> wmic product get name

Name
Microsoft Visual C++ 2019 X64 Minimum Runtime - 14.28.29910
Update for Windows 10 for x64-based Systems (KB4023057)
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.24.28127
VMware Tools
Druva inSync 6.6.3
Microsoft Update Health Tools
Microsoft Visual C++ 2019 X64 Additional Runtime - 14.28.29910
Update for Windows 10 for x64-based Systems (KB4480730)
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.24.28127

Enumerating Local Ports

Enumerating Process ID

Enumerating Running Service

Druva inSync Windows Client Local Privilege Escalation Example

Powershell PoC

Reverse shell

Rename it something simple like shell.ps1. Append the following at the bottom of the script file

Modify the $cmd variable to get rs

https://github.com/yevh/CVE-2020-5752-Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-/blob/main/DruvaPE.ps1

Catching a SYSTEM Shell

Execute the PoC PowerShell script on the target host after bypassing execution policy

Bypass Powershell Execution Policy

SysaxAutomation

iTunes - CVE-2024-44193

iTunes version 12.13.2.3

Teamviewer

TeamViewer

AnyDesk

Before v9.0.1.

AnyDesk

Last updated