Visiting the 9256 we will just see a message "ERROR"
<imgsrc="https://imgur.com/A33GqVP.png"/>
Also visiting port 9255 we will be redirected back to 9256 so nothing we can do here but from nmap scan it tells that this is `AChat chat system` so let's search for it on google
<imgsrc="https://i.imgur.com/c89PbRj.png"/>
Right off the bat it reutrns with an exploit so let's give this is a try, this repo has two files , one a bash script which will generate the raw payload that we have to edit it in the python script which is the actual exploit which will give the shell
<imgsrc="https://imgur.com/mpQLNrQ.png"/>
<imgsrc="https://i.imgur.com/R0xQoOs.png"/>
Paste the payload in the python script
<imgsrc="https://imgur.com/ABcxm1C.png"/>
Also edit the target ip
<imgsrc="https://i.imgur.com/2ptOY1t.png"/>
Set the meterpreter listener
<imgsrc="https://imgur.com/qhfmhg3.png"/>
But when I run the exploit it gives me a shell but dies suddenly
<imgsrc="https://i.imgur.com/DHnAEpl.png"/>
I also tried by changning the payload from `windows/meterpreter/reverse_tcp` to `windows/shell/reverse_tcp` but it sill died
<imgsrc="https://imgur.com/udflW6x.png"/>
But using the payload `windows/shell/reverse_tcp` on metepreter I was able to get a shell
<imgsrc="https://imgur.com/8Mc2r22.png"/>
<imgsrc="https://imgur.com/L3Z3lo7.png"/>
To get a meterpreter session let's use the module `post/multi/manage/shell_to_meterpreter`
<imgsrc="https://imgur.com/JXZgNVq.png"/>
<imgsrc="https://i.imgur.com/wgRnZD8.png"/>
I ran winpeas after getting a metepreter uploaded it using `upload file` and saw that we have access to `Administrator` folder
<imgsrc="https://i.imgur.com/FbludpK.png"/>
But we can't access file root. txt , it's weird as we have access to the whole directory
<imgsrc="https://i.imgur.com/D7IRwni.png"/>
I tried to give `read` access to root.txt but it gave access denied then used `cacls` which is a deprecated windows command which is replaced `icacls`
<imgsrc="https://i.imgur.com/zNiar6X.png"/>
It's showing `N` for user Alfred which means no permissions are given to this user on root.txt file , going to the documentation I was able to give rights to this file