Tea (chain) (medium)

port scan

10.10.178.198 srv.tea.vl

10.10.178.197 dc.tea.vl

service enumeration

register a account, we can found a runner SRV

gitea runner abuse

so there have a runner, we will create a action let runner execute our evil code

i will create a new repo with .gitea/workflows/demo.yaml

add our evil job

push!

after push, we must enable actions at our repo

just commit again with every change

it works now

we have a beacon!

some enumeration

read LAPS

in _instal folder, there have a laps installer

we can use Get-LapsADPassword -Identity SRV -AsPlainText read administrator password

work

WSUS abuse

ther have a folder called WSUS-Updates

get a administrator beacon and run sharpwsus inspect

it show srv is wsus server, we can use

https://github.com/techspence/SharpWSUS to abuse wsus

we will push psexec (just allow ms sign), and add a user

then approve the request

it works

and the user at there

now try again to add our evil user into administrators group

administrator shell!

Last updated