Heist (Easy)
Enumeration
Nmap
nmap -sC -sV -oA nmap/10.10.10.149 10.10.10.149Nmap scan report for 10.10.10.149
Host is up (0.11s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
| http-title: Support Login Page
|_Requested resource was login.php
135/tcp open msrpc Microsoft Windows RPC
445/tcp open microsoft-ds?
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2021-07-09T16:24:17
|_ start_date: N/A
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Jul 9 12:24:52 2021 -- 1 IP address (1 host up) scanned in 72.60 secondsAs usual, I will check port 80 and port 445
Port 80

We can see a page like this and we are able to login as guest.

When we click the attachment shown at user Hazard, we can see this

Upon researching, we know that type 7 password is crack-able.
We can use this website to crack it.
Meanwhile, for the type 5 password, we can use John-The-Ripper to crack it.
Hash
Password
02375012182C1A1D751618034F36415408
Q4)sJu\Y8qz*A3?d
0242114B0E143F015F5D1E161713
$uperP@ssword
$1$pdQG$o8nrSzsGXeaduXrjlvKc91
stealth1agent
After tons of trying, finally can login to SMB using the correct pair of credentials.

Then, I proceed to use impacket-lookupsid to find other possible users.

We can see there are user Chase and Jason.
From the nmap full tcp scan, we know that port 5985 is for win-rm that can let us to login to the system.
User
We can use user Chase and the password Q4)sJu\Y8qz*A3?d

Got user flag !

Privilege Escalation
after some enumeration, we can see that Mozilla Firefox is installed in the machine.

From the ps command, we can see that there are few Firefox processes running.

We can use ProcDump64 to dump all the information inside the processes, then use strings to extract the information.


We can see there is a dump being created
Now we can use strings.exe to pipe the readable input to a file.
After that, we can download the file that we have readable strings.
When I use sublime to search for the password, it shows this

Then, we can proceed to login as administrator using the password shown.


Congratz !
Last updated
Was this helpful?